Books in category Computers – Security | Page 5

  • Management of Information Security

    Management of Information Security
    Michael Whitman, Herbert Mattord

    This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series.

  • Protecting Information

    Protecting Information
    Susan Loepp, William K. Wootters

    By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science.Of particular …

  • Cyber Security Awareness for Lawyers

    Cyber Security Awareness for Lawyers
    David Willson, Henry Dalziel

    The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer …

  • Defence Electronics

    Defence Electronics
    Ray Tricker

    The book is comprised of 14 chapters that are organized into six parts. The text first covers the quality systems and control of defense electronics, and then proceeds to tackling the certification and purchasing of electronic components.

  • Critical Information Infrastructures Security

    Critical Information Infrastructures Security
    Erich Rome, Marianthi Theocharidou, Stephen Wolthusen

    This book constitutes revised selected papers from the 10th International Conference on Critical Information Infrastructures Security, CRITIS 2015, held in Berlin, Germany, in October 2015.

  • Computer Forensics Investigating File and Operating Systems Wireless Networks and Storage CHFI

    Computer Forensics: Investigating File and Operating Systems, Wireless Networks, and Storage (CHFI)
    EC-Council

    The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal.

  • Inside the SPAM Cartel

    Inside the SPAM Cartel
    Spammer-X Spammer-X

    Authored by a former spammer, this is a methodical, technically explicit expose of the innerworkings of the SPAM economy.

  • Seven Deadliest Social Network Attacks

    Seven Deadliest Social Network Attacks
    Carl Timm, Richard Perez

    This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children …

  • Managing an Information Security and Privacy Awareness and Training Program

    Managing an Information Security and Privacy Awareness and Training Program
    Rebecca Herold

    This book includes examples and tools from a wide range of businesses, enabling readers to select effective components that will be beneficial to their enterprises.

  • Differential Privacy

    Differential Privacy
    Ninghui Li, Min Lyu, Dong Su, Weining Yang

    This Synthesis Lecture is the first of two volumes on differential privacy. This lecture differs from the existing books and surveys on differential privacy in that we take an approach balancing theory and practice.

< Previous 3 4 5 6 7 Next >