Related Books
Language: en
Pages: 610
Pages: 610
Type: BOOK - Published: 2005 - Publisher: Addison-Wesley Professional
A revolutionary, soups-to-nuts approach to network security from two of Microsoft's leading security experts.
Language: en
Pages: 416
Pages: 416
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Mi
Language: en
Pages: 185
Pages: 185
Type: BOOK - Published: 2008-07-12 - Publisher: Springer Science & Business Media
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks.
Language: en
Pages: 318
Pages: 318
Type: BOOK - Published: 2013-03-14 - Publisher: Springer
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from Septembe
Language: en
Pages: 483
Pages: 483
Type: BOOK - Published: 2008-12-24 - Publisher: Springer Science & Business Media
If we are to believe in Moore’s law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of co