Free Delivery Over $100
3712 books were found.
"""Crypto Fundamentals: Unlocking the World of Cryptocurrencies"" is your essential guide to navigating the exciting... Read More >>
This book constitutes the refereed proceedings of the 26th International Conference on Information Security and... Read More >>
Read More >>
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains... Read More >>
"In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams... Read More >>
"""Privacy-Preserving Technologies in Software Development"" is an essential guide for developers, privacy advocates,... Read More >>
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important... Read More >>
Distributed ledger technology, the backbone of cryptocurrencies like Bitcoin, extends far beyond the realm of digital... Read More >>
Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography... Read More >>
Esaminare lo spazio modernizzato con sicurezza e sottigliezza � un'impresa che richiede una profonda comprensione... Read More >>
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops... Read More >>
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography... Read More >>
�Se embarca en un viaje hacia la excelencia en las Fuerzas A�reas? No busque m�s all� de nuestra completa gu�a de... Read More >>
Discover the ins and outs of cybersecurity architecture with this handbook, designed to enhance your expertise in... Read More >>
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference... Read More >>
"Discover the power of AI in the crypto world, from Bitcoin's disruptive emergence to GPT-4's cutting-edge analysis.... Read More >>
This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing... Read More >>
This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography,... Read More >>
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself... Read More >>
This comprehensive examination delves into the financial repercussions faced by 50 companies victimized by data... Read More >>