search for books and compare prices
computer security matches 283 work(s)
at beginning | displaying 1 to 25 | next 25 >
Jump to start at |
show results in order: alphabetically | oldest to newest | newest to oldest
cover image for 9780071819749
Product Description: Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal...read more

Paperback:

9780071819749 | McGraw-Hill Osborne Media, August 13, 2015, cover price $65.00 | About this edition: Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

cover image for 9781597499491
Product Description: The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc...read more

Paperback:

9781597499491 | Syngress Media Inc, November 13, 2012, cover price $49.95 | About this edition: The newest threat to security has been categorized as the Advanced Persistent Threat or APT.

cover image for 9789812790323
Product Description: In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security...read more
By Antoni Martinez-Balleste (editor) and Agusti Solanas (editor)

Hardcover:

9789812790323 | World Scientific Pub Co Inc, August 3, 2009, cover price $145.00 | also contains Advances in Artificial Intelligence for Privacy Protection and Security | About this edition: In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.

cover image for 9789812790323
Product Description: In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security...read more

Hardcover:

9789812790323 | World Scientific Pub Co Inc, August 3, 2009, cover price $145.00 | also contains Advances in Artificial Intelligence for Privacy Protection and Security | About this edition: In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.

cover image for 9783642051821
Product Description: Intelligent Information Systems (IIS) can be defined as the next generation of Information Systems (IS) developed as a result of integration of AI and database (DB) technologies. IIS embody knowledge that allows them to exhibit intelligent behavior, allows them to cooperate with users and other systems in problem solving, discovery, retrieval, and manipulation of data and knowledge...read more
By Zbigniew W. Ras (editor)

Hardcover:

9783642051821 | 1 edition (Springer Verlag, February 15, 2010), cover price $269.00 | About this edition: Intelligent Information Systems (IIS) can be defined as the next generation of Information Systems (IS) developed as a result of integration of AI and database (DB) technologies.

cover image for 9781466649408
Product Description: Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems...read more
By D. P. Acharjya (editor)

Hardcover:

9781466649408 | Idea Group Reference, December 31, 2013, cover price $195.00 | About this edition: Technological advancements have extracted a vast amount of useful knowledge and information for applications and services.

cover image for 9780155025905
Product Description: Fine paperback copy. Particularly and surprisingly well-preserved; tight, bright, clean and especially sharp-cornered. ; 478 pages; Table and chart illustrated.

Paperback:

9780155025905 | Harcourt, January 1, 1987, cover price $31.95 | also contains Handbook of Information and Communication Security | About this edition: Fine paperback copy.

cover image for 9780132789462
Product Description: “In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology...read more

Hardcover:

9780132789462 | Prentice Hall, September 4, 2011, cover price $115.00 | About this edition: “In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges.

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

Paperback:

9781502518576 | Createspace Independent Pub, September 27, 2014, cover price $40.99
9781118608647 | John Wiley & Sons Inc, March 31, 2014, cover price $50.00 | About this edition: The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat.

cover image for 9781466616493
Product Description: As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual's purchasing habits, associations, or other information has become increasingly less private...read more

Hardcover:

9781466616493 | Idea Group Reference, May 31, 2012, cover price $195.00 | About this edition: As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual's purchasing habits, associations, or other information has become increasingly less private.

cover image for 9781119096726
Product Description: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information...read more

Hardcover:

9781119096726, titled "Applied Cryptography: Protocols, Algorithms and Source Code in C" | 20 anv edition (John Wiley & Sons Inc, March 30, 2015), cover price $70.00 | About this edition: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography.
9780471128458 | 2 sub edition (John Wiley & Sons Inc, January 1, 1996), cover price $60.00 | About this edition: ".

Paperback:

9780471117094 | 2 revised edition (John Wiley & Sons Inc, November 1, 1995), cover price $60.00 | About this edition: Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code.
9780471597568 | John Wiley & Sons Inc, January 1, 1994, cover price $44.95 | also contains We Should All Be Ecofeminists: Friends of the Earth | About this edition: Detailing how C and C++++ programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data, a guide shows how security can be built into software and systems used every day.
9780440120872, titled "The Cardross Luck" | Reissue edition (Dell Pub Co, April 1, 1987), cover price $2.95 | also contains The Cardross Luck | About this edition: In aristocratic Regency England, it was most uncommon for a young lady to propose marriage--but there was nothing common about beautiful, headstrong Heather Mallory.

Miscellaneous:

9781118081969 | 2 edition (John Wiley & Sons Inc, February 11, 2011), cover price $60.00

cover image for 9780124172081
Product Description: Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM.  Network security monitoring is based on the principle that prevention eventually fails...read more

Paperback:

9780124172081 | Syngress Media Inc, December 5, 2013, cover price $49.95 | About this edition: Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up.

cover image for 9780764542800
A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

Hardcover:

9780471237129 | John Wiley & Sons Inc, October 11, 2002, cover price $45.00 | About this edition: A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

Paperback:

9780764542800 | John Wiley & Sons Inc, October 17, 2003, cover price $16.95 | About this edition: A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

Miscellaneous:

9780471432289 | John Wiley & Sons Inc, October 2, 2001, cover price $16.95 | About this edition: A former computer hacker who turned his life around reveals how he now works as a computer security expert, protecting corporations from other hackers.

cover image for 9781119076285
Product Description: This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues Presents new concepts such as immune danger theory, immune concentration,  and class-wise information gain (CIG) ...read more

Hardcover:

9781119076285 | IEEE Computer Society, May 27, 2016, cover price $105.00 | About this edition: This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues Presents new concepts such as immune danger theory, immune concentration,  and class-wise information gain (CIG) 

cover image for 9781284090703
Product Description: Part of the Jones& Bartlett Learning Information System Security & Assurance Series! The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector...read more

Paperback:

9781284090703 | 2 edition (Jones & Bartlett Pub, July 10, 2015), cover price $99.95 | About this edition: Part of the Jones& Bartlett Learning Information System Security & Assurance Series!
9780763791810 | Jones & Bartlett Pub, September 30, 2010, cover price $101.95 | About this edition: PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!

cover image for 9789812564054
Product Description: The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation...read more

Hardcover:

9789812564054 | World Scientific Pub Co Inc, September 12, 2005, cover price $99.00 | About this edition: The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions.
9780080302720, titled "Process Systems Engineering" | Pergamon Pr, December 1, 1983, cover price $47.50 | also contains Process Systems Engineering

cover image for 9780124116443
Product Description: The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test...read more

Paperback:

9780124116443 | 2 edition (Syngress Media Inc, August 1, 2013), cover price $29.95 | About this edition: The Basics of Hacking and Penetration Testing, 2nd Ed.
9781597496551 | Syngress Media Inc, July 21, 2011, cover price $29.95 | About this edition: The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end.

cover image for 9780128007440
Product Description: As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security...read more

Paperback:

9780128007440 | 2 edition (Syngress Media Inc, June 9, 2014), cover price $34.95 | About this edition: As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects.

cover image for 9780124171596
Product Description: The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA...read more

Paperback:

9780124171596 | Syngress Media Inc, November 22, 2013, cover price $39.95 | About this edition: The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing.

cover image for 9780745332819
Product Description: Biohackers explores fundamental changes occuring in the circulation and ownership of scientific information. Alessandro Delfanti argues that the combination of the ethos of 20th century science, the hacker movement and the free software movement is producing an open science culture which redefines the relationship between researchers, scientific institutions and commercial companies...read more

Hardcover:

9780745332819 | Pluto Pr, May 7, 2013, cover price $99.00 | About this edition: Biohackers explores fundamental changes occuring in the circulation and ownership of scientific information.

Paperback:

9780745332802 | Pluto Pr, May 7, 2013, cover price $32.00 | About this edition: Biohackers explores fundamental changes occuring in the circulation and ownership of scientific information.

cover image for 9781593275907
Product Description: When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more...read more

Paperback:

9781593275907 | No Starch Pr, December 14, 2014, cover price $34.95 | About this edition: When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts.
9780373122561, titled "The Mistress Scandal" | Harlequin Books, June 1, 2002, cover price $3.99 | also contains The Mistress Scandal | About this edition: More than a one-night stand?

cover image for 9781118662090
Product Description: Hackers exploit browser vulnerabilities to attack deep withinnetworks The Browser Hacker's Handbook gives a practicalunderstanding of hacking the everyday web browser and using it as abeachhead to launch further attacks deep into corporate networks...read more

Paperback:

9781118662090 | John Wiley & Sons Inc, March 24, 2014, cover price $55.00 | About this edition: Hackers exploit browser vulnerabilities to attack deep withinnetworks The Browser Hacker's Handbook gives a practicalunderstanding of hacking the everyday web browser and using it as abeachhead to launch further attacks deep into corporate networks.

at beginning | displaying 1 to 25 | next 25 >