search for books and compare prices
computer security matches 283 work(s)
< previous 25 | displaying 26 to 50 | next 25 >
Jump to start at |
cover image for 9781119076285
Product Description: This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues Presents new concepts such as immune danger theory, immune concentration,  and class-wise information gain (CIG) ...read more

Hardcover:

9781119076285 | IEEE Computer Society, May 27, 2016, cover price $105.00 | About this edition: This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues Presents new concepts such as immune danger theory, immune concentration,  and class-wise information gain (CIG) 

cover image for 9780071819749
Product Description: Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal...read more

Paperback:

9780071819749 | McGraw-Hill Osborne Media, August 13, 2015, cover price $65.00 | About this edition: Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

cover image for 9781119040743
Product Description: Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work...read more

Hardcover:

9781119040743 | John Wiley & Son Ltd, August 7, 2015, cover price $121.90 | About this edition: Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures.

cover image for 9781107043053
Product Description: In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing...read more

Hardcover:

9781107043053 | Cambridge Univ Pr, July 31, 2015, cover price $79.99 | About this edition: In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource.

cover image for 9781491900987
Product Description: As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach...read more

Paperback:

9781491900987 | Oreilly & Associates Inc, July 16, 2015, cover price $49.99 | About this edition: As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially.
9780380773015, titled "Stellar Ranger" | Avon Books, May 1, 1994, cover price $4.99 | also contains Stellar Ranger | About this edition: When a brilliant and evil lunatic plans to take over the universe, Cinch Carston, a solitary ranger who rides the galactic frontier, confronts the villain on a desert planet called Roget.

cover image for 9780470500965
Product Description: This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns...read more

Hardcover:

9780470500965 | John Wiley & Sons Inc, June 8, 2015, cover price $110.00 | About this edition: This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology.

cover image for 9781137513588
Product Description: This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can be carried out. In studying these matters, the book examines the privacy issues raised by the NSA, publication of state secrets, and DNA usage...read more

Hardcover:

9781137513588 | Palgrave Macmillan, June 16, 2015, cover price $105.00 | About this edition: This book lays out the foundation of a privacy doctrine suitable to the cyber age.

cover image for 9781466683457
Product Description: "This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--
By Marwan Omar (editor)

Hardcover:

9781466683457 | Idea Group Reference, April 30, 2015, cover price $200.00 | About this edition: "This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--

cover image for 9781482239225
Product Description: The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world...read more
By Thomas A. Johnson (editor)

Hardcover:

9781482239225 | CRC Pr I Llc, April 16, 2015, cover price $62.95 | About this edition: The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today.

cover image for 9781107017887
Product Description: Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage...read more

Hardcover:

9781107017887 | Cambridge Univ Pr, March 31, 2014, cover price $105.00 | About this edition: Cryptography has been employed in war and diplomacy from the time of Julius Caesar.

Paperback:

9781107603455 | Cambridge Univ Pr, March 31, 2014, cover price $34.99 | About this edition: Cryptography has been employed in war and diplomacy from the time of Julius Caesar.

cover image for 9781119096726
Product Description: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information...read more

Hardcover:

9781119096726, titled "Applied Cryptography: Protocols, Algorithms and Source Code in C" | 20 anv edition (John Wiley & Sons Inc, March 30, 2015), cover price $70.00 | About this edition: From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography.
9780471128458 | 2 sub edition (John Wiley & Sons Inc, January 1, 1996), cover price $60.00 | About this edition: ".

Paperback:

9780471117094 | 2 revised edition (John Wiley & Sons Inc, November 1, 1995), cover price $60.00 | About this edition: Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code.
9780471597568 | John Wiley & Sons Inc, January 1, 1994, cover price $44.95 | also contains We Should All Be Ecofeminists: Friends of the Earth | About this edition: Detailing how C and C++++ programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data, a guide shows how security can be built into software and systems used every day.
9780440120872, titled "The Cardross Luck" | Reissue edition (Dell Pub Co, April 1, 1987), cover price $2.95 | also contains The Cardross Luck | About this edition: In aristocratic Regency England, it was most uncommon for a young lady to propose marriage--but there was nothing common about beautiful, headstrong Heather Mallory.

Miscellaneous:

9781118081969 | 2 edition (John Wiley & Sons Inc, February 11, 2011), cover price $60.00

cover image for 9781118335895
Product Description: This new text provides students the knowledge and skills they will need to compete for and succeed in the information security roles they will encounter straight out of college.  This is accomplished by providing a hands-on immersion in essential system administration, service and application installation and configuration, security tool use, TIG implementation and reporting...read more

Paperback:

9781118335895 | John Wiley & Sons Inc, April 21, 2014, cover price $170.40 | About this edition: This new text provides students the knowledge and skills they will need to compete for and succeed in the information security roles they will encounter straight out of college.

cover image for 9780385539005
Product Description: NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015

Hardcover:

9780385539005 | Doubleday, February 24, 2015, cover price $27.95 | About this edition: NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015

cover image for 9780804193030
Product Description: NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined...read more
By Robertson Dean (narrator) and Marc Goodman

CD/Spoken Word:

9780804193030 | Unabridged edition (Random House, February 24, 2015), cover price $50.00 | About this edition: NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined.

cover image for 9781284055931
Product Description: Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools...read more

Hardcover:

9780205277308, titled "Social Psychology" | 8th bk&stu edition (Prentice Hall, May 1, 1997), cover price $81.00 | also contains Social Psychology | About this edition: A comprehensive work containing updated coverage of the field of social psychology.
9780444415332, titled "Impact Wear of Materials" | Elsevier Science Ltd, December 1, 1976, cover price $148.75 | also contains Impact Wear of Materials | About this edition: Impact Wear of Materials is entirely devoted to quantitative treatment of various forms of wear occurring in impact-loaded mechanical components.

Paperback:

9781284055931 | 2 pap/psc edition (Jones & Bartlett Pub, February 22, 2015), cover price $152.95 | About this edition: Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
9781449648206 | Pap/psc edition (Jones & Bartlett Pub, November 18, 2011), cover price $199.95 | About this edition: Elementary Information Security is certified to comply fully with the NSTISSI 4011: the federal training standard for information security professionals Comprehensive and accessible, Elementary Information Security covers the entire range of topics required for US government courseware certification NSTISSI 4011 and urges students to analyze a variety of security problems while gaining experience with basic tools of the trade.

cover image for 9780134085043
Product Description: The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures...read more

Hardcover:

9780134085043 | 5th edition (Prentice Hall, February 5, 2015), cover price $120.00 | About this edition: The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures.

cover image for 9789059054004
Product Description: It is very important to safeguard your computer and protect your privacy while surfing the Internet. What can you do to prevent cybercriminals from getting hold of your personal data? How do you safely use the Internet without contracting viruses on your computer? How do you make sure it is safe to shop online or do your Internet banking?In this book we explain how to protect your computer from viruses and spyware...read more
By Studio Visual Steps (corporate author)

Paperback:

9789059054004 | Visual Steps B V, December 18, 2014, cover price $19.95 | About this edition: It is very important to safeguard your computer and protect your privacy while surfing the Internet.

cover image for 9781466673816
Product Description: Data collection allows todays businesses to cater to each customers individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company...read more
By Manish Gupta (editor)

Hardcover:

9781466673816 | Idea Group Reference, December 31, 2014, cover price $325.00 | About this edition: Data collection allows todays businesses to cater to each customers individual needs and provides a necessary edge in a competitive market.

cover image for 9781593275907
Product Description: When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more...read more

Paperback:

9781593275907 | No Starch Pr, December 14, 2014, cover price $34.95 | About this edition: When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts.
9780373122561, titled "The Mistress Scandal" | Harlequin Books, June 1, 2002, cover price $3.99 | also contains The Mistress Scandal | About this edition: More than a one-night stand?

cover image for 9780133993325
Product Description: Battle-Tested Best Practices for Securing Android Apps throughout the Development Lifecycle   Android’s immense popularity has made it today’s #1 target for attack: high-profile victims include eHarmony, Facebook, and Delta Airlines, just to name a few...read more

Paperback:

9780133993325 | Prentice Hall, December 17, 2014, cover price $39.99 | About this edition: Battle-Tested Best Practices for Securing Android Apps throughout the Development Lifecycle   Android’s immense popularity has made it today’s #1 target for attack: high-profile victims include eHarmony, Facebook, and Delta Airlines, just to name a few.

cover image for 9789400799455
Product Description: This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention...read more
By Ronald Leenes (editor)

Hardcover:

9789400706408 | Springer-Verlag New York Inc, March 3, 2011, cover price $249.00 | About this edition: This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention.
9780408106818, titled "Discipline of Politics" | Butterworth-Heinemann, October 1, 1981, cover price $54.95 | also contains Discipline of Politics

Paperback:

9789400799455, titled "Computers, Privacy and Data Protection: An Element of Choice" | Springer Verlag, November 21, 2014, cover price $249.00 | About this edition: This timely interdisciplinary work on current developments in ICT and privacy/data protection, coincides as it does with the rethinking of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR) and the judicial and political resistance against data retention.

cover image for 9780128012758
Product Description: SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks...read more

Paperback:

9780128012758 | 3 edition (Syngress Media Inc, April 23, 2015), cover price $49.95 | About this edition: SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.
9781597499477 | 2 edition (Syngress Media Inc, August 2, 2012), cover price $49.95
9781597496254 | Syngress Media Inc, January 31, 2011, cover price $49.95 | About this edition: There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more.

cover image for 9789462390577
Product Description: Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to “emerged and exciting new computing paradigm of Ubiquitous Computing”, includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere...read more
By Teddy Mantoro (editor)

Hardcover:

9789491216701 | Springer-Verlag New York Inc, September 14, 2012, cover price $129.00 | About this edition: Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments.

Paperback:

9789462390577 | Bilingual edition (Springer-Verlag New York Inc, October 15, 2014), cover price $129.00 | About this edition: Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments.

cover image for 9783642442032
Product Description: At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.
By Kai Rannenberg (editor)

Hardcover:

9783642203169 | Springer Verlag, July 19, 2011, cover price $239.00 | About this edition: At the end of the PrimeLife EU project, a book will contain the main research results.

Paperback:

9783642442032 | Springer Verlag, October 9, 2014, cover price $239.00 | About this edition: At the end of the PrimeLife EU project, a book will contain the main research results.

cover image for 9781493005697
Product Description:  According to the U.S .Department of Justice, more than six million people are stalked each year in the United States alone. Don’t become one of them! International cybercrime expert Alexis Moore can help protect you from the spurned lovers, angry neighbors, and jealous coworkers who use the Internet as the perfect way to exact revenge and wreak havoc on your life...read more

Paperback:

9781493005697 | Lyons Pr, October 7, 2014, cover price $16.95 | About this edition:  According to the U.

< previous 25 | displaying 26 to 50 | next 25 >