Free Delivery Over $100
4163 books were found.
The pixels you see are not your own. Not truly. In an age where digital threats penetrate deeper than ever, ""The... Read More >>
As cyber-threats escalate and trust in institutions declines, traditional voting systems show their limitations.... Read More >>
Embedded devices now power everything from consumer electronics and industrial systems to critical infrastructure... Read More >>
PRISON BLUES turns one of the world's most ordinary developer tools into something unexpected: a covert, end-to-end... Read More >>
THE FINANCIAL SYSTEM HAS BEEN REBOOTED. ARE YOU THE OWNER OR THE PRODUCT? Money is no longer just a medium of exchange-it... Read More >>
What if the random numbers securing your cloud applications are more predictable than you think? For decades, developers... Read More >>
Cet ouvrage propose une analyse approfondie des finances décentralisées (DeFi) en tant que phénomène technique,... Read More >>
Spot it early. Contain it fast. Recover clean. TLDR+ Ransomware is a hands-on field manual for handling ransomware... Read More >>
The Hyperproof Manifesto addresses a second failure mode of large-scale digital systems: authority that exists only... Read More >>
Applied Cryptography for Engineers: Hash and Trash is a practical guide to cryptography as it is actually used and... Read More >>
So... you thought your web app was secure? Cute. Let's be real - if your code touches the internet, it's already... Read More >>
ISO 27001: Der vollständige Leitfaden zur Implementierung eines Informationssicherheits-ManagementsystemsSchritt-für-Schritt... Read More >>
Understanding Cyber Threats Through Behavioral Intelligence"" reframes the entire discipline of cybersecurity, arguing... Read More >>
""This is an undergraduate textbook that uses provable security as its approach. Provable security transforms cryptography... Read More >>
Read More >>
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference... Read More >>
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS... Read More >>
This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for... Read More >>
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography,... Read More >>
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security... Read More >>
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret... Read More >>
Everyone needs security: Nations need national security, corporations need corporate security, individuals need... Read More >>