Related Books

Securing IM and P2P Applications for the Enterprise
Language: en
Pages: 480
Authors: Marcus Sachs
Categories: Computers
Type: BOOK - Published: 2005-12-12 - Publisher: Elsevier

GET EBOOK

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses
The Secure Online Business Handbook
Language: en
Pages: 264
Authors: Jonathan Reuvid
Categories: Business & Economics
Type: BOOK - Published: 2005 - Publisher: Kogan Page Publishers

GET EBOOK

This book is a practical guide for managers in developing and implementing appropriate strategies for online risk management. The contributions draw on a wide r
Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols
Language: en
Pages: 1122
Authors: Hossein Bidgoli
Categories: Business & Economics
Type: BOOK - Published: 2006-03-20 - Publisher: John Wiley and Sons

GET EBOOK

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on in
Computer Security Handbook, Set
Language: en
Pages: 2034
Authors: Seymour Bosworth
Categories: Computers
Type: BOOK - Published: 2012-07-18 - Publisher: John Wiley & Sons

GET EBOOK

The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale compute
Advances in Networks, Computing and Communications 3
Language: en
Pages: 279
Authors: Paul Dowland
Categories: Computer networks
Type: BOOK - Published: 2006 - Publisher: Lulu.com

GET EBOOK