Free Delivery Over $100
22968 books were found.
The two-volume set LNBIP 572 + 573 constitutes selected papers from the 22nd European, Mediterranean, and Middle... Read More >>
This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference... Read More >>
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025,... Read More >>
Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung... Read More >>
This book constitutes the refereed proceedings of the IFIP WG 9.7 International Workshop on the History of Computing,... Read More >>
Develop the skills to stop AI-powered cyberattacks and leverage AI to improve your existing cybersecurity strategies.... Read More >>
A deeply informed, nail-biting expose of the multibillion-dollar hacking and ransomware industry Read More >>
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack... Read More >>
Read More >>
Security Systems Technologies and Innovation: A Comprehensive History of Advances looks at the last 50 years and... Read More >>
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration... Read More >>
An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical... Read More >>
Off-the-record sabotage, hidden naval fleets, and targeted cyber intrusions: these escalating assaults remain shadowy... Read More >>
As a seasoned PHP developer, you’ve mastered classes, objects, and interfaces, yet bugs continue to surface after... Read More >>
The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum... Read More >>
This book constitutes the refereed proceedings of the first International Conference on Cybersecurity, IoT, Data... Read More >>
Digital threats are growing increasingly sophisticated and traditional defense methods such as firewalls, password... Read More >>
Historically, cyber security was always a “poor relation” in the eyes of the majority of Boards and CEOs, considered... Read More >>
Demystify Blockchain— Plain Language, Real-World Impact Blockchain is transforming industries, reshaping finance,... Read More >>