Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the Second International Conference on Smart Blockchain, SmartBlock... Read More >>
Read More >>
"How blockchain technology will revolutionize industries across the globe and become the foundation for internet... Read More >>
This book constitutes the proceedings of the 17th International Conference on Service-Oriented Computing, ICSOC... Read More >>
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in... Read More >>
The conference covers various aspects of information technologies, focusing on queueing theory, stochastic processes,... Read More >>
Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on... Read More >>
Are you interested in learning how to become a hacker? If your answer is yes, then look no further. This book will... Read More >>
This is a Vintage and Retro Birthday, Anniversary, Valentine's day, or any occasion gift for Cryptography lovers... Read More >>
"What is the most beautiful equation in mathematics? It is widely considered to be Euler's identity (also known... Read More >>
Explores the depth and breadth of the field of cryptology. This title begins by tracing the development of cryptology... Read More >>
Internet Password Log Book This is the perfect book to organize for all your passwords and information together... Read More >>
A historical-conceptual account of the different genres, technologies, modes of inscription, and innate powers of... Read More >>
Der Autor behandelt den Entwurfsprozess der Gotik unter dem Aspekt von Entwurfs- und Entwicklungsprozessen der Informatik... Read More >>
This is the perfect book to keep all your password information together and secure. This discreet password journal... Read More >>
The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics... Read More >>
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security,... Read More >>
Internet Password Log BookThis is the perfect book to organize for all your passwords and information together and... Read More >>