Free Delivery Over $100
22921 books were found.
Build a more secure network with PF. The OpenBSD packet filter, PF, is central to the OpenBSD and FreeBSD network... Read More >>
This Festschrift is dedicated to Professor Sjouke Mauw on the occasion of his 65th birthday. Prof. Mauw obtained... Read More >>
Off-the-record sabotage, hidden naval fleets, and targeted cyber intrusions: these escalating assaults remain shadowy... Read More >>
This book constitutes the proceedings of the 27th International Conference on Passive and Active Measurement, PAM... Read More >>
An up-to-date exploration of how AI is transforming cybersecurity and how to implement AI in your organization’s... Read More >>
A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet... Read More >>
The Basics of Hacking and Penetration Testing Read More >>
The Element identifies avoidance or alleviation of harm as a central legal preoccupation, outlines technical developments... Read More >>
Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital... Read More >>
Digital identities now stand as the primary target amid an AI-powered cyber landscape. Addressing risks from adversarial... Read More >>
A practical, recipe-driven guide to everyday Microsoft Intune administration. This book helps you deploy, secure,... Read More >>
This book LNCS 16327 constitutes the referred proceedings of the 11th International Symposium on Security and Privacy... Read More >>
This book is an essential read for any student, academic or professional in the disciplines of computer engineering,... Read More >>
Parenting doesn't come with a manual-especially in the digital age. Today's children grow up surrounded by screens,... Read More >>
Read More >>
In the digital world, one click can change everything. Social media promises fame, friendship, and freedom-but... Read More >>
This book provides a comprehensive exploration of AI-driven approaches to strengthening CPS security. Cyber-physical... Read More >>
Why does the problem of data privacy remain so intractable? Deep Dark Data explores how this contemporary problem... Read More >>
This research examines the adoption of blockchain technology in pharmaceutical supply chains, focusing on the barriers... Read More >>
An up-to-date analysis of cyberwarfare and hybrid warfare against the backdrop of the present conflict between Russia... Read More >>
An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples of... Read More >>
With the growing security challenges at the intersection of distributed machine learning and malicious interference,... Read More >>