The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber...
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical...
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers...
How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for...
This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called...