Free Delivery Over $100
3712 books were found.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning... Read More >>
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security... Read More >>
This book constitutes the referred proceedings of the 9th Iberoamerican Workshop on Human-Computer Interaction,... Read More >>
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability... Read More >>
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer... Read More >>
Break this code: QDOJHQ FRPPHQGHG WKH SHRSOH RI WKH ZLWK Hint for the reader: patriots and tiki torches... Read More >>
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including... Read More >>
Building a Secure Digital Future in the EU: Your Guide to DORA and NIS 2 (348 words)Feeling overwhelmed by DORA... Read More >>
Demystifying the EU AI Act: A Guide to Responsible Artificial Intelligence.This book dives into the groundbreaking... Read More >>
This book dives into the evolving world of cybersecurity regulations within the European Union, focusing on two... Read More >>
Readers must visit the HTML version of each chapter and access the Electronic Supplementary Material. Extras for... Read More >>
""This book delves into the fascinating realm of GANs, a groundbreaking area of machine learning that has transformative... Read More >>
Read More >>
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International... Read More >>
When Bitcoin, a blockchain-based payment system, is mentioned, many think of how many poor, middle-class, and youth... Read More >>
In a world consumed by information warfare, where the line between truth and deception becomes increasingly blurred,... Read More >>
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis... Read More >>
"�Alguna vez has imaginado un mundo donde las transacciones financieras, los contratos y la propiedad digital se... Read More >>
This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing... Read More >>
Throughout the book, there is a strong emphasis on the collaborative nature of cybersecurity, emphasizing the importance... Read More >>