Books in category Computers – Security

  • Information Hiding

    Information Hiding
    Jan Camenisch

    This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

  • Blockchain

    Blockchain
    Sean Bennett

    This book will cover the following: • The Fundamentals of Blockchain • Smart Contracts • The Story Behind Blockchain • How Blockchain Works • Main Participants in a Blockchain Transaction • Key Elements in Block Batching & …

  • Security Strategies in Windows Platforms and Applications

    Security Strategies in Windows Platforms and Applications
    Michael G. Solomon

    The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management.

  • Computer and Network Security Essentials

    Computer and Network Security Essentials
    Kevin Daimi

    This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem.

  • Digital Watermarking and Steganography

    Digital Watermarking and Steganography
    Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker

    This new edition now contains essential information on steganalysis and steganography New concepts and new applications including QIM introduced Digital watermark embedding is given a complete update with new processes and applications

  • The Information Systems Security Officer s Guide

    The Information Systems Security Officer’s Guide
    Gerald L. Kovacich

    This essential guide covers everything from effective communication to career guidance for the information security officer.

  • A Classical Introduction to Cryptography

    A Classical Introduction to Cryptography
    Serge Vaudenay

    This book is also suitable for researchers and practitioners in industry.

  • IPSec

    IPSec
    Naganand Doraswamy, Dan Harkins

    The insider's guide to IPSec for every network professional–updated for the newest standards, techniques, and applications.

  • Linux Firewalls

    Linux Firewalls
    Michael Rash

    Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, …

  • Cyber Security Cyber Crime and Cyber Forensics Applications and Perspectives

    Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
    Santanam, Raghu

    Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions …

1 2 3 4 5 Next >