Free Delivery Over $100
19728 books were found.
"Discover the highly anticipated Second Edition to the Amazon #1 Best Seller, The Future of Public Transportation.... Read More >>
Helps learners master the skills necessary to launch and complete a successful computer investigation. This resource... Read More >>
It’s not just computers—hacking is everywhere. Legendary cybersecurity expert and The New York Times best-selling... Read More >>
Im Zentrum steht der IT-Leistungserbringer, der auf Basis der vier strategischen IT-Perspektiven Geschäftsprozessorientierung,... Read More >>
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security... Read More >>
This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber... Read More >>
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability... Read More >>
The advent of the Internet, exponential growth in computing power, and rapid developments in artificial intelligence... Read More >>
This book explores how transformative changes driven by the new-age economy can bring about improvements in a company's... Read More >>
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer... Read More >>
This book provides a comprehensive overview of cyber-physical systems and the security concepts like attack detection... Read More >>
This book consolidates the research relating to the security in SDN, CSDN, and Hybrid SDNs. The security enhancements... Read More >>
Confronting “the beast within” us all, Werewolf at Dusk celebrates the singular genius of David Small Read More >>
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis... Read More >>
This book discusses a range of topics that are essential to understanding cyber security, including legal implications... Read More >>
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards,... Read More >>
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International... Read More >>
EMCIS covers technical, organizational, business, and social issues in the application of information technology... Read More >>
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International... Read More >>
An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time... Read More >>