Free Delivery Over $100
3712 books were found.
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology... Read More >>
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically... Read More >>
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed... Read More >>
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door... Read More >>
Quantum Cryptography: Securing the Future with Quantum Tech delves into the cutting-edge world of quantum cryptography... Read More >>
Read More >>
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source... Read More >>
A key step here is to investigate how and why the security breach happened in the first place. The best to do this... Read More >>
In this context, the book offers readers hopes as well as warnings about how technology can be used for the public... Read More >>
Microcontroller Exploits is a deep dive into advanced hardware hacking with detailed examples of real-world techniques... Read More >>
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity... Read More >>
Mathematical Foundations of Computer Science introduces students to the discrete mathematics needed later in their... Read More >>
""Secure Health confronts these challenges head-on, offering a comprehensive exploration of the latest advancements... Read More >>
Unlock the Power of IoT Security and Protect Your Devices from Evolving Cyber Threats! In today's hyperconnected... Read More >>
The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity... Read More >>
Curious about blockchain and cryptocurrencies but unsure where to start? ELI5: Blockchains & Cryptocurrencies is... Read More >>
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from... Read More >>
The core of the Bitcoin white paper published in 2008 was that digital assets could be traded directly and securely... Read More >>
This open access book constitutes the proceedings of the 9th International Joint Conference on Electronic Voting,... Read More >>
This book constitutes the refereed proceedings of the 28th International Conference on Linking Theory and Practice... Read More >>