IEEE Computer Society Store Catalog

Welcome to the new IEEE Computer Society Store Catalog.  Below, please browse our list of featured products, or search the CS Store for your desired topics.  You can also check out our certification products, Safari Premium, education resources.  Visit the CS Digital Library or Search for single articles.

Please note, some products require log in in order to purchase.  Computer Society Members, be sure to log in to receive your member discount!


5 results

Modules include infrastructure basics - hacking Unix, databases, and applications - hacking windows - information gathering, profiling, and cross-site scripting - injection, flaws, files, and hacks.
In this second presentation in a series, John Howie will provide an overview of cloud security challenges faced by enterprises adopting public, community and even private clouds.
This course provides a broad overview of various software security threats and some of the most effective countermeasures used to thwart both well-known and newly emerging software security threats.
The fast productization of IoT technologies is leaving users vulnerable to security and privacy risks.
Led by moderator Joshua Greenbaum, Principal, Enterprise Applications Consulting, this panel explores what's good and what's not so good for individuals, end-user organizations and their software and service providers as privacy, mobility, and the cl...

Computing Now