Free Delivery Over $100
3712 books were found.
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual... Read More >>
This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications,... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Futuristic Trends in Network... Read More >>
An exploration of infographics and data visualization as a cultural phenomenon, from eighteenth-century print culture... Read More >>
In this Element we develop: stochastic models, which add a crucial element of uncertainty to human interaction;... Read More >>
Simple, elegant, and powerful, tools are available in user-friendly, free software to help design, build, and run... Read More >>
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration... Read More >>
The newest addition to the wildly successful Big Fat Notebook series, with 3.99 million copies in print: a lively,... Read More >>
The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference... Read More >>
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday... Read More >>
This book constitutes the refereed post-conference proceedings of the First EAI International Conference on Sustainable... Read More >>
In this guide, we shall be discussing everything there is to know about cryptocurrencies, their impact on the future... Read More >>
The increased digitization and automation taking place at a rapid pace across all the spheres are our activity are... Read More >>
This two-volume set constitutes the proceedings of the 19th IFIP WG 6.11 Conference on e-Business, e-Services, and... Read More >>
This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on... Read More >>
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security... Read More >>
Read More >>
In twenty-five concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program... Read More >>
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code... Read More >>