The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational...
150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This...
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the...
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design...
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and...
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other...
Finally--a single volume guide to really effective security for both voice and data wireless networks! More and more data and voice communications are...
Contemporary Security Management, Second Edition, is the most comprehensive and up-to-date security management book available. The book is designed to...