Free Delivery Over $100
4072 books were found.
Read More >>
In today's interconnected digital society, the protection of information is not just a technical requirement but... Read More >>
Unlock the core techniques of modern software exploitation - from buffer overflows to return-oriented programming... Read More >>
This is the fourth book in Microsoft Purview 2025 series and covers the privacy section of Microsoft Purview. Who... Read More >>
This is the second book in the Microsoft Purview series. The book's main focus is on Microsoft Purview Risk & Compliance... Read More >>
This book describes and explains a number of simple cryptographic methods and techniques. Eash section gives some... Read More >>
Let's face it: the internet is a magical place-until it's not. One minute you're uploading cat videos, and the next... Read More >>
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security... Read More >>
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency... Read More >>
Unlocking the future of image and video coding with AI-based Image and Video Coding: Methods, Standards, and Applications,... Read More >>
mso-bidi-font-weight: bold;"">The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International... Read More >>
Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically... Read More >>
Ready to audit like a boss and build bulletproof cyber resilience (without losing your mind or your Wi-Fi)? Welcome... Read More >>
Find vulnerabilities before anyone else does. Find vulnerabilities before anyone else does. Zero days aren't magic-they're... Read More >>
In addition to acting as a core title for classes in digital communications, the book also can be included in classes... Read More >>