Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive in...
There is considerably more skill in the IT and security communities than is reflected in the j...
For those with legitimate reason to use the Internet anonymously--diplomats, military and othe...
Identity authentication and authorization are integral tasks in today's digital world. As busi...
Assessing vendors is a tricky process. Large and regulated organizations are forced to demonst...
Unser bisheriger Preis:ORGPRICE: 24,00 €
The Dictionary of Information Security is a compilation of security terms and definitions that wo...
Unser bisheriger Preis:ORGPRICE: 32,50 €
Linux Malware Incident Response is a 'first look' at the Malware Forensics Field Guide ...
Unser bisheriger Preis:ORGPRICE: 17,23 €
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all s...
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fac...
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource una...