The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational...
150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This...
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way...
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer...
This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides...
This book is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or...
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing...
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council...