Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in Africa, AFRICACRYPT... Read More >>
Work with over 150 real-world examples of threat manifestation in software development and identify similar design... Read More >>
Frama-C is a popular open-source toolset for analysis and verification of C programs, largely used for teaching,... Read More >>
"Sei interessato alla tecnologia innovativa che sta ridefinendo le industrie e il modo in cui conduciamo gli affari?... Read More >>
Explore the world of crypto anarchy, its impact on personal privacy and decentralization, with enlightening insights... Read More >>
"""The History and Evolution of Invisible Ink"" by Herkimer Throckmorton explores the origins, uses, and advancements... Read More >>
Read More >>
This book offers crucial solutions and insights on how transportation companies can enhance their cybersecurity... Read More >>
The Vietnam War continues to cast a long shadow over American history and the world's understanding of international... Read More >>
This book introduces a simplified approach to web application development using the open-source ASP .Net Core MVC... Read More >>
This volume constitutes the refereed and revised post-conference proceedings of the 8th IFIP WG 5.15 International... Read More >>
From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the... Read More >>
Write popular DeFi and NFT smart contracts with Vyper, a Pythonic programming language, and integrate blockchain... Read More >>
Are you concerned about the security of critical infrastructure? Advanced Cybersecurity for Critical Infrastructure... Read More >>
"Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it... Read More >>
Lastly, a selection of future directions are examined that may be used by the trusted execution environments of... Read More >>
This two-volume set IFIP AICT 701-702 constitutes the refereed post-conference proceedings of the 20th IFIP WG 5.1... Read More >>
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. Read More >>
This textbook offers the knowledge and the mathematical background or techniques that are required to implement... Read More >>
This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with... Read More >>
This book constitutes the refereed proceedings of the 6th CCF China Blockchain Summit, CBCS 2023, held in Haikou,... Read More >>
This monograph presents a mathematically rigorous and accessible treatment of the interaction between information,... Read More >>