Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the 18th IFIP WG 9.4 International Conference on Implications... Read More >>
This book constitutes the refereed proceedings of the 12th Annual Privacy Forum on Privacy Technologies and Policy,... Read More >>
This book constitutes the refereed proceedings of the 16th IFIP International Conference on Human Choice and Computers,... Read More >>
This book constitutes the refereed proceedings of the 10th EAI International Conference on INISCOM 2024, held in... Read More >>
This book focuses on optical-wireless communication systems. The primary topics covered in the book are channel... Read More >>
Implementing Zero-Knowledge Proofs with Practical Applications and Code Examples is a comprehensive guide that explores... Read More >>
Read More >>
The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of... Read More >>
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPS) due to the... Read More >>
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing,... Read More >>
This book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy... Read More >>
This practical guide to building embedded and IoT devices securely is an essential resource for current and future... Read More >>
Technical debt is an often-overlooked problem that the software industry needs to take more seriously. All organizations... Read More >>
Delve into the cutting-edge trends of decentralized identities, blockchains, and other digital identity management... Read More >>
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras... Read More >>
Lee Parrish provides an example-laden vision to improve cybersecurity governance in the boardroom. Additionally,... Read More >>
This handbook is a comprehensive guide for beginners to understand and implement cybersecurity practices in their... Read More >>
Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic... Read More >>