150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This...
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with...
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to...
This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most...
Finally--a single volume guide to really effective security for both voice and data wireless networks! More and more data and voice communications are...
CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP...
Contemporary Security Management, Second Edition, is the most comprehensive and up-to-date security management book available. The book is designed to...
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent...
Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will...
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may...