Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the 15th Conference on Image and Graphics Technologies and Applications,... Read More >>
This book constitutes the refereed proceedings of the 15th International Workshop on Communication Technologies... Read More >>
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security,... Read More >>
Read More >>
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of... Read More >>
This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International... Read More >>
This book provides a comprehensive explanation of forward error correction, which is a vital part of communication... Read More >>
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International... Read More >>
Password Tracker Book If you are tired of continually forgetting the usernames and passwords you created... Read More >>
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference... Read More >>
Learn to build decentralized applications for track & trace, product provenance, supply chain management and beyond... Read More >>
Do you want to learn how to the art of hacking in as little time as possible? Hacking and the field of Cybersecurity... Read More >>
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security... Read More >>
Password Tracker Book If you are tired of continually forgetting the usernames and passwords you... Read More >>
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT... Read More >>
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security,... Read More >>
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International... Read More >>
This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS... Read More >>
"From the author of the acclaimed book ""The Secrets Of Bitcoin Hackers"" comes another gem - ""How To Crack Bitcoin... Read More >>