Real-Time Embedded Systems

Real-Time Embedded Systems. Offering comprehensive coverage of the convergence of real-time embedded systems scheduling, resource access control, software design and...

DNS Security Management

DNS Security Management (IEEE Press Series on Networks and Services Management). An advanced Domain Name System (DNS) security resource that...

The InfoSec Handbook

The InfoSec Handbook: An Introduction to Information Security. The InfoSec Handbook offers the reader an organized layout of information that...

Advanced API Security

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE. Advanced API Security is a complete reference...

Enterprise Cybersecurity

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. Unify your organization’s people, budgets, technologies, and processes...

Cyber Operations

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks. Learn to set up, defend, and attack computer networks. This book...

Structured Peer-to-Peer Systems

Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. The field of structured P2P systems has seen fast...

Pattern and Security Requirements

Pattern and Security Requirements: Engineering-Based Establishment of Security Standards. Security threats are a significant problem for information technology companies today....

Cyber Security

Cyber Security: Analytics, Technology and Automation. Over the last two decades, the Internet and more broadly cyberspace has had a...