Free Delivery Over $100
32863 books were found.
Many organizations today are required to have a formal IT Security Program in place in order to do business with... Read More >>
Read More >>
"""Biometric Framework Security using Finger Knuckle"" is a comprehensive and cutting-edge guide that explores the... Read More >>
"""Scalable Framework for Cyber Threat Situational Awareness"" is a comprehensive and practical guide that explores... Read More >>
On any given day, at any given hour, across the various platforms constituting what we call social media, someone... Read More >>
Data meshes can help your organization decentralize data, giving ownership back to the engineers who produced it.... Read More >>
However, in order to meaningfully recognize and filter fakes by means of artificial intelligence, it must be possible... Read More >>
This book gathers the proceedings of the 12th International Conference on Frontier Computing, held in Tokyo, Japan,... Read More >>
Get up and running with serverless workloads across AWS, Azure, GCP, Kubernetes, and virtual machines with real-life... Read More >>
"""Shell Scripting in Action: Real-world Examples and Case Studies"" is a comprehensive guide that takes you on... Read More >>
This book is a compilation of selected papers from the Seventh Symposium on Digital Instrumentation and Control... Read More >>
Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new... Read More >>
This book provides insights on how to approach and utilise data science tools, technologies/methodologies related... Read More >>
It contains original research works presented at the International Conference on Microelectronics, Electromagnetics... Read More >>
The book presents selected papers from the 18th International Conference on Intelligent Information Hiding and Multimedia... Read More >>
This book constitutes the proceedings of the 20th International Conference on the Integration of Constraint Programming,... Read More >>
The book discusses Society 5.0 which fills the gap between cyber and physical space by providing a balanced environment... Read More >>
"The world of computing has undergone several paradigm shifts since the dawn of the digital age. Mainframes, once... Read More >>
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The... Read More >>