Free Delivery Over $100
4165 books were found.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for... Read More >>
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies... Read More >>
A mysterious guide. A hidden protocol. A descent into the digital unknown. Welcome to the journey. The DarkWhale... Read More >>
Demystify Blockchain— Plain Language, Real-World Impact Blockchain is transforming industries, reshaping finance,... Read More >>
""This is an undergraduate textbook that uses provable security as its approach. Provable security transforms cryptography... Read More >>
This book explores various aspects of knowledge graph reasoning to solve different tasks, encompassing first, traditional... Read More >>
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference... Read More >>
Read More >>
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS... Read More >>
This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for... Read More >>
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography,... Read More >>
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security... Read More >>
Everyone needs security: Nations need national security, corporations need corporate security, individuals need... Read More >>
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret... Read More >>
Cybersecurity for Healthcare Systems in the Internet of Medical Things Era is driven by the imperative to address... Read More >>
Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital... Read More >>
PRISON BLUES turns one of the world's most ordinary developer tools into something unexpected: a covert, end-to-end... Read More >>
The text presents an artificial intelligence-based framework, algorithms, and applications from the perspective... Read More >>
The emergence of quantum computing introduces a significant shift in the digital and security landscape—prompting... Read More >>
Enables readers to understand the full lifecycle of adversarial machine learning (AML) and how AI models can be... Read More >>
This primer introduces the elements that distinguish well-written computer code, covering style, clarity, technique,... Read More >>
Most people who own advanced technology never turn it into anything meaningful. Not because they lack ability-but... Read More >>