![Real Digital Forensics: Computer Security and Incident Response](/uploads/profile_image/0fb/5c8c0c26-27ec-44a6-8601-874f5c4c50fb.jpg?m=1522358082)
Real Digital Forensics: Computer Security and Incident Response
Keith J. Jones, Richard Bejtlich and Curtis W. Rose
Book
You can't succeed in the field of computer forensics without hands-on practice--and you can't get...
Security for Wireless Sensor Networks Using Identity-Based Cryptography
Harsh Kupwade Patil and Stephen A. Szygenda
Book
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based...
![Water Security in India: Hope, Despair, and the Challenges of Human Development](/uploads/profile_image/802/83b6d79f-2d16-4fa9-8297-cbf124d2e802.jpg?m=1522323260)
Water Security in India: Hope, Despair, and the Challenges of Human Development
Vandana Asthana and A.C. Shukla
Book
Few people actively engaged in India's water sector would deny that the Indian subcontinent faces...
![The Life and Work of General Andrew J. Goodpaster: Best Practices in National Security Affairs](/uploads/profile_image/85a/30acf8db-3512-4dc7-a54e-c608665b185a.jpg?m=1522338149)
The Life and Work of General Andrew J. Goodpaster: Best Practices in National Security Affairs
Book
This biography shows the importance of experienced soldier-scholars with high integrity on national...
![Feeding Cities: Improving Local Food Access, Security and Resilience](/uploads/profile_image/1ba/6826ff28-dc95-40c8-8794-ce6b14e4f1ba.jpg?m=1522340007)
Feeding Cities: Improving Local Food Access, Security and Resilience
Book
There is enormous current interest in urban food systems, with a wide array of policies and...
![Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations](/uploads/profile_image/b99/4ec2c95f-9179-4389-bf88-cd74535c8b99.jpg?m=1522337800)
Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations
Book
The Internet of Things (IoT) has attracted strong interest from both academia and industry....
![Supply Chain Safety Management: Security and Robustness in Logistics](/uploads/profile_image/53f/5572ba36-6bec-4171-a47e-be6fecb6f53f.jpg?m=1522337733)
Supply Chain Safety Management: Security and Robustness in Logistics
Michael Essig, Michael Hulsmann, Eva-Maria Kern and Stephan Klein-Schmeink
Book
Companies face a variety of risks resulting from cost reduction strategies, rationalization...
![Prepper's Home Defense: Security Strategies to Protect Your Family by Any Means Necessary](/uploads/profile_image/c6b/077d54e9-f1b3-4d67-851d-e3f6f7eddc6b.jpg?m=1522326917)
Prepper's Home Defense: Security Strategies to Protect Your Family by Any Means Necessary
Book
DETER . DELAY. DEFEND! Does your disaster preparation plan include security measures? When...
Women, Peace and Security in Nepal: From Civil War to Post-Conflict Reconstruction
Book
This book sheds new light on the important but diverse roles of women in the civil war in Nepal...
![Modern Cryptography: Applied Mathematics for Encryption and Information Security](/uploads/profile_image/a9a/45059261-d8d6-4211-83b5-1c5e74d3ba9a.jpg?m=1522328404)
Modern Cryptography: Applied Mathematics for Encryption and Information Security
Book
This comprehensive guide to modern data encryption makes cryptography accessible to information...