
Information and Communication Security: Second International Conference, Icics'99 Sydney, Australia, November 9-11, 1999 Proceedings
Paperback
Series: Lecture Notes in Computer Science, Book 1726
General ComputersGeneral MathematicsComputer Security
ISBN13: 9783540666820
Publisher: Springer Nature
Published: Oct 20 1999
Pages: 328
Weight: 1.76
Height: 0.72 Width: 8.50 Depth: 11.00
Language: English
Also in
Computer Security
Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy
Deibert, Ronald J.
Hardcover
Password Logbook (Hip Floral): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location
Editors of Rock Point
Hardcover
Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack!
Welsh, Joshua
Paperback
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
Stewart, James Michael
Gibson, Darril
Chapple, Mike
Paperback
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
Kloep, Peter
Kofler, Michael
Gebeshuber, Klaus
Paperback
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
Schneier, Bruce
Paperback
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Greenberg, Andy
Paperback
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
Wolff, Josephine
Paperback
Digital Ethics in the Age of AI: Navigating the ethical frontier today and beyond
Mehan, Julie
Paperback
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
Aumasson, Jean-Philippe
Paperback
Isc2 Cissp Certified Information Systems Security Professional Official Study Guide
Chapple, Mike
Stewart, James Michael
Gibson, Darril
Paperback
Comptia Security+ Study Guide with Over 500 Practice Test Questions: Exam Sy0-701
Chapple, Mike
Seidl, David
Paperback
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Zetter, Kim
Paperback
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Occupytheweb
Paperback
Password Logbook (Black & Gold): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location
Editors of Rock Point
Hardcover
Faik: A Practical Guide to Living in a World of Deepfakes, Disinformation, and Ai-Generated Deceptions
Carpenter, Perry
Hardcover
Web Application Security: Exploitation and Countermeasures for Modern Web Applications
Hoffman, Andrew
Paperback
Shit I Can't Remember: Keep track of usernames, passwords, web addresses in one easy & organized location
Books, Family's
Paperback
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Murdoch Gse, Don
Paperback
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
Menn, Joseph
Paperback
Wtf Is My Password: Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover
Pray, Norman M.
Paperback
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
Stuttard, Dafydd
Pinto, Marcus
Paperback
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
Harper, Allen
Linn, Ryan
Sims, Stephen
Paperback
Building a Career in Cybersecurity: The Strategy and Skills You Need to Succeed
Diogenes, Yuri
Paperback
The Online World, What You Think You Know and What You Don't: 4 Critical Tools for Raising Kids in the Digital Age
Mankarious, Rania
Paperback
Hacking: Computer Hacking for beginners, how to hack, and understanding computer security!
Dodson, Adam
Hardcover
Algorithms of Armageddon: The Impact of Artificial Intelligence on Future Wars
Galdorisi, George
Tangredi, Sam J.
Hardcover
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Reiber, Lee
Paperback
Hacking Etico 101 - Cómo hackear profesionalmente en 21 días o menos!: 2da Edición. Revisada y Actualizada a Kali 2.0.
Astudillo B., Karina
Paperback
Cisa Certified Information Systems Auditor Study Guide: Covers 2024 - 2029 Exam Objectives
Chapple, Mike
Gregory, Peter H.
Paperback
Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware
Crossley, Cassie
Paperback
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Paar, Christof
Pelzl, Jan
Güneysu, Tim
Hardcover
Security Chaos Engineering: Sustaining Resilience in Software and Systems
Shortridge, Kelly
Rinehart, Aaron
Paperback
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
Golden, Daniel
Dudley, Renee
Paperback
Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking
Weyers, Jos
Burrough, Matt
Belgers, Walter
Paperback
Humorous Cryptograms: 300 Large Print Puzzles To Keep You Entertained (Large Print Edition)
Nest, Game
Paperback
Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools
Jaswal, Nipun
Paperback
Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers
Crose, Emily
Hardcover
Cloud Native Application Protection Platforms: A Guide to Cnapps and the Foundations of Comprehensive Cloud Security
Miles, Russ
Smith, Taylor
Giguere, Stephen
Paperback
SSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography
Baka, Paul
Schatten, Jeremy
Paperback
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Zhussupov, Zhassulan
Paperback
Cyberdynamx: The Art and Science of Building a Simplified Digital Security Program
Blais, Curtis L.
Paperback
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization
Xu, Peng
Kolosnjaji, Bojan
Xiao, Huang
Paperback
Internet Password Logbook (Red Leatherette): Keep Track of Usernames, Passwords, Web Addresses in One Easy and Organized Location
Editors of Rock Point
Hardcover
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Cucci, Kyle
Paperback
Isc2 Cissp Certified Information Systems Security Professional Official Practice Tests
Seidl, David
Chapple, Mike
Paperback
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology
Graber, Diana
Paperback
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
Holden, Joshua
Paperback
Windows Security Internals: A Deep Dive Into Windows Authentication, Authorization, and Auditing
Forshaw, James
Paperback
Hacking Exposed 7: Network Security Secrets and Solutions
Kurtz, George
Scambray, Joel
McClure, Stuart
Paperback
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Oettinger, William
Paperback
Cyber War: The Next Threat to National Security and What to Do about It
Knake, Robert
Clarke, Richard A.
Paperback
Comptia Security+ All-In-One Exam Guide, Sixth Edition (Exam Sy0-601)
Conklin, Wm Arthur
White, Greg
Hardcover
Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect your email, computer, and bank accounts from hackers, malware, and identity theft
Bailey, Sean M.
Devin, Kropp
Paperback
The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks
Wittkop, Jeremy
Paperback
Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions
Shbeeb, Aaron
Bodungen, Clint
Singer, Bryan
Paperback
Mastering Linux Security and Hardening - Third Edition: A practical guide to protecting your Linux system from cyber attacks
Tevault, Donald a.
Paperback
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Saydjari, O. Sami
Paperback
Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers
Merli, Dominik
Paperback
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr
Dunkerley, Mark
Tumbarello, Matt
Paperback
Cism Certified Information Security Manager All-In-One Exam Guide [With CD (Audio)]
Gregory, Peter H.
Paperback
The CyberSecurity Leadership Handbook for the CISO and the CEO: How to Fix Decade-Old Issues and Protect Your Organization from Cyber Threats
Gaillard, Jean-Christophe
Paperback
Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense
Hartman, Shane
Paperback
Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF
Brown, Jason
Paperback
Python for Security and Networking - Third Edition: Leverage Python modules and tools in securing your network and applications
Ortega, José Manuel
Paperback
Don't Trust Your Gut: Using Data to Get What You Really Want in Life
Stephens-Davidowitz, Seth
Paperback
Technology for Littles: Helping Young Children Navigate the Internet Responsibly
Rogers-Whitehead, Carrie
Paperback
Zero Trust Networks: Building Secure Systems in Untrusted Networks
Rais, Razi
Morillo, Christina
Gilman, Evan
Paperback
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Hassan, Nihad A.
Hijazi, Rami
Paperback
Practical Iot Hacking: The Definitive Guide to Attacking the Internet of Things
Stais, Ioannis
Calderon, Paulino
Chantzis, Fotios
Paperback
IT Governance: An international guide to data security and ISO 27001/ISO 27002, Eighth edition
Calder, Alan
Watkins, Steve
Paperback
Cisco Cybersecurity Operations Fundamentals Cbrops 200-201 Official Cert Guide
Santos, Omar
Hardcover
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters
Calhoun, Frederick S.
Weston J. D., Stephen W.
Paperback
Practical Cybersecurity Architecture - Second Edition: A guide to creating and implementing robust designs for cybersecurity architects
Kelley, Diana
Moyle, Ed
Paperback
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
Troia, Vinny
Paperback
Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem
Hughes, Chris
Robinson, Nikki
Paperback
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Fyodor
Lyon, Gordon
Paperback
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
Arcuri, Jennifer
Hickey, Matthew
Paperback
Intelligence-Driven Incident Response: Outwitting the Adversary
Brown, Rebekah
Roberts, Scott J.
Paperback
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security and Privacy for Non-Techies
Parker, Carey
Paperback
The Art of Deception: Controlling the Human Element of Security
Mitnick, Kevin D.
Simon, William L.
Paperback
The Definitive Guide to KQL: Using Kusto Query Language for Operations, Defending, and Threat Hunting
Morowczynski, Mark
Trent, Rod
Zorich, Matthew
Paperback
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
Chappell, Laura
Paperback
The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
Espinosa, Christian
Paperback