Free Delivery Over $100
3451 books were found.
Manual básico e imprescindible de base para comenzar en el mundo de las investigaciones de fuentes y recursos abiertos.... Read More >>
As statistics become additional rife in society, the analysis space is antic- ipated to deal with an ever widening... Read More >>
Das Lehrbuch gibt einen systematischen Einstieg in die Signaltheorie und behandelt sowohl die in der Ingenieur-Literatur... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 9th EAI International Conference on Industrial Networks and... Read More >>
¡Descubre la... Read More >>
"Embark on an unparallеlеd journеy into thе rеalm of cryptocurrеncy mastеry with ""Thе Ultimatе Trеzor Mastеry Handbook.... Read More >>
This book illustrates how the blockchain is being sustained through a host of platforms, programming languages,... Read More >>
"""A math-based guide for information security practitioners. Teaches how to use concepts from various fields of... Read More >>
"In ""Crypto Crossroads, "" delve into the gripping saga of Binance, the world's leading cryptocurrency exchange,... Read More >>
"Description: ""Dive into the thrilling world of cryptocurrencies with 'Crypto 101, ' your comprehensive handbook... Read More >>
Bitcoin and The Trust Problem: Is Bitcoin adoption accelerated by the Abuse of Trust? This question might not... Read More >>
Cryptography is a technique of communication and information security that allows only the sender and the intended... Read More >>
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning... Read More >>
This book constitutes the proceedings of the 5th Conference on Creativity in Intellectual Technologies and Data... Read More >>
This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection... Read More >>
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. Read More >>
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the... Read More >>