free tracker

Applied Information Security

Pub Date : 2011-10-27 | Author : David Basin | Publisher : Springer Science & Business Media

ISBN 10 : 9783642244742
ISBN 13 : 3642244742

This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. ..


Computer Security Handbook Set

Pub Date : 2014-03-24 | Author : Seymour Bosworth | Publisher : John Wiley & Sons

ISBN 10 : 9781118851746
ISBN 13 : 1118851749

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, priv..



Analyzing Computer Security

Pub Date : 2012 | Author : Charles P. Pfleeger | Publisher : Prentice Hall Professional

ISBN 10 : 9780132789462
ISBN 13 : 0132789469

A fresh new approach to computer security by the authors of the 20-year best-selling classic Security in Computing. • •Introduces computer security the way today's practitioner..


Risk Management For Computer Security

Pub Date : 2005 | Author : Andy Jones | Publisher : Butterworth-Heinemann

ISBN 10 : 9780750677950
ISBN 13 : 0750677953

The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of ..


Cyber Security Engineering

Pub Date : 2016-11-07 | Author : Nancy R. Mead | Publisher : Addison-Wesley Professional

ISBN 10 : 9780134189871
ISBN 13 : 0134189876

Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software ..


Data Driven Security

Pub Date : 2014-01-24 | Author : Jay Jacobs | Publisher : John Wiley & Sons

ISBN 10 : 9781118793824
ISBN 13 : 111879382X

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent securi..


Leave a Reply

Your email address will not be published. Required fields are marked *