Free Delivery Over $100
4166 books were found.
A mysterious guide. A hidden protocol. A descent into the digital unknown. Welcome to the journey. The DarkWhale... Read More >>
""This is an undergraduate textbook that uses provable security as its approach. Provable security transforms cryptography... Read More >>
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference... Read More >>
Read More >>
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS... Read More >>
This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for... Read More >>
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography,... Read More >>
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security... Read More >>
Everyone needs security: Nations need national security, corporations need corporate security, individuals need... Read More >>
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret... Read More >>
Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital... Read More >>
PRISON BLUES turns one of the world's most ordinary developer tools into something unexpected: a covert, end-to-end... Read More >>
The emergence of quantum computing introduces a significant shift in the digital and security landscape—prompting... Read More >>
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies... Read More >>
Enables readers to understand the full lifecycle of adversarial machine learning (AML) and how AI models can be... Read More >>
Demystify Blockchain— Plain Language, Real-World Impact Blockchain is transforming industries, reshaping finance,... Read More >>
This primer introduces the elements that distinguish well-written computer code, covering style, clarity, technique,... Read More >>
Most people who own advanced technology never turn it into anything meaningful. Not because they lack ability-but... Read More >>
So... you thought your web app was secure? Cute. Let's be real - if your code touches the internet, it's already... Read More >>
The internet is evolving once again-and this time, the change is about ownership, control, and participation. You... Read More >>
APPRENEZ LE OpenVAS Maîtrisez la Détection, l'Automatisation et la Gestion des Vulnérabilités en Environnements... Read More >>
Build off grid LoRa mesh networks that still deliver messages when conventional infrastructure is unreliable, overloaded,... Read More >>