-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
End-to-End Network Security
UMTS Security
Advanced API Security
Android Security Internals
Data-Driven Security
Beautiful Security
Cloud Security and Privacy
Security Monitoring
The Myths of Security
Security Metrics
Security Power Tools
Network Security Bible
Wireless and Mobile Networks Se ...
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with ...
End-to-End Network Security
End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highl ...
Router Security Strategies: Sec ...
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separat ...
UMTS Security
Can you afford not to read this book?…The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
The Manager’s Guide to Web Appl ...
The Manager’s Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written ...
Computer Security – ESORICS 201 ...
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013 ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...
Managing Risk and Information S ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
Security Metrics
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample ...
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security P ...
Network Security Hacks, 2nd Edi ...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network ...
Network Security Bible
* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of sec ...