You are here: Home > Security
Choose a sub category:
Crytography Forensics & Biometrics
Network & Computer Security Personal Information Security
Security Policies & Procedures Software Security
Web Security
Sort By:
Page of 25
Hacking Web 2.0 Exposed
List Price: $49.99
Sale Price: $39.99
You save $10.00!

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
Digital Watermarking 2nd Ed.
List Price: $90.95
Sale Price: $63.66
You save $27.29!

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken.
Algorithmic Game Theory
List Price: $46.99
Sale Price: $42.29
You save $4.70!

In the last few years game theory has had a substantial impact on computer science, especially on Internet- and e-commerce-related issues. Algorithmic Game Theory develops the central ideas and results of this new and exciting area in a clear and succinct manner.
Multi-application Smart Cards: Technology and Applications
List Price: $86.95
Sale Price: $81.95
You save $5.00!

Multi-application smart cards have yet to realise their enormous potential, partly because few people understand the technology, market, and behavioural issues involved.
SOA SECURITY
List Price: $59.99
Sale Price: $47.99
You save $12.00!

Anyone seeking to implement SOA Security is forced to dig through a maze of inter-dependent specifications and API docs that assume a lot of prior security knowledge on the part of readers. Getting started on a project is proving to be a huge challenge to practitioners. This book seeks to change that. It provides a bottom-up understanding of security techniques appropriate for use in SOA without assuming any prior familiarity with security topics.
Hacking: The Art of Exploitation, 2nd Edition
List Price: $49.95
Sale Price: $32.46
You save $17.49!

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Introduction to Modern Cryptography
List Price: $81.95
Sale Price: $69.65
You save $12.30!

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.
Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition
List Price: $80.00
Sale Price: $64.00
You save $16.00!

The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy ó and as they specialize, they get better
Hacking Exposed Linux
List Price: $49.99
Sale Price: $37.49
You save $12.50!

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
List Price: $39.99
Sale Price: $31.99
You save $8.00!

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite