The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational...
150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This...
The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory...
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to...
Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the...
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way...
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer...
This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides...