Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls …
The threat of radiological terrorism has recently come to the attention of the international community, as it became clear that …
Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from …
Integrated Security Systems Design,2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains …
As countries across the globe continue to adjust their security operations to counter an increasingly volatile political landscape, the issue …
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in …
Excellent high-lvel book for anyone involved with software development and implementation. This book digs deep with enough details of security …
This book is designed for security and risk assessment professionals, DevOpsengineers, penetration testers, cloud security engineers, and cloud softwaredevelopers who …
Discusses the actions of different types of bodyguards, such as Caesar's Praetorian Guard, Japanese samurai warriors, and Wild West outlaws, …
This timely book spotlights how various entities are using the Internet to shape people's perceptions and decision-making. Also describes detailed …
Книга Foundations of Mac OS X Leopard Security Foundations of Mac OS X Leopard SecurityКниги Mac OS Автор: Charles Edge, …
Learn to evaluate and compare data encryption methods and attack cryptographic systemsKey FeaturesExplore popular and important cryptographic methodsCompare cryptographic modes …
From MSNBC terrorism expert Walid Phares, this is a frightening look into the future of jihad.В Though anВ alarming new …
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content …