Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way...
Understanding and Servicing Alarm Systems, Third Edition has seen the alarm industry enter the computer age. With its coverage of microcomputerized...
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and...
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with...
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices...
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical...
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or...
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge...
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and...