Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Focuses on presenting specific innovative computing artifacts and tools developed by researchers that are not commercially used. This work presents approaches and frameworks that focus on ability of an enterprise to analyze, build and protect computing infrastructure that supports value-added dimensions to the enterprise's business processes.
Focuses on Information Assurance, Security and Privacy Services. This book discusses Program Security, Data Security and Authentication, Internet Scourges, Web Security, Usable Security, Human-Centric Aspects, Security, Privacy and Access Control, Economic Aspects of Security, Threat Modeling, Intrusion and Response.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.