Get the most from ASP.NET Core Identity. Best-selling author Adam Freeman teaches developers common authentication and user management scenarios and …
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover …
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer …
* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * …
Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched …
This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and …
API Design Patterns lays out a set of design principles for building internal and public-facing APIs.Summary A collection of best …
Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a …
Biometrics: Personal Identification in Networked Society is a comprehensive and accessible source of state-of-the-art information on all existing and emerging …
Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have …
William Stallings Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with …
Cryptography and Network Security For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is …
Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network …
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, …
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques …
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second …
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers …
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is …
Please Read Notes: Brand New, International Softcover Edition, Printed in black and white pages, minor self wear on the cover …
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is …