Free Delivery Over $100
22537 books were found.
THE INVISIBLE EMPIRE Israel's AI Warriors and the Algorithmic Future of Warfare The final volume in Ivo Vichev's... Read More >>
Welcome to Kali Linux for Bug Bounty & Ethical Hacking Careers, the ultimate guide for anyone who wants to dive... Read More >>
In an era of ubiquitous connectivity, the digital landscape is a relentless battleground. Cyber threats escalate... Read More >>
In an era where every click, every connection, and every piece of shared information becomes a potential vulnerability,... Read More >>
From Queries to Exploits: The Art of GraphQL Hacking is not just another dry cybersecurity manual - it's your backstage... Read More >>
KALI LINUX RED TEAM 2025 Domine Estratégias Ofensivas com Ferramentas de Alta Performance Este livro é indicado... Read More >>
Navigating the complex world of digital accessibility laws just got a whole lot easier. This book is your... Read More >>
Read More >>
Comprehensive reference on safeguarding electrical power systems from faults and failures, exploring emerging technologies... Read More >>
This book constitutes the proceedings of the 14th International Conference on Telematics and Computing, WITCOM 2025,... Read More >>
An up-to-date discussion about the mitigation of satellite communications vulnerabilities In Safeguarding Satellite... Read More >>
In an age where cyber warfare is no longer science fiction but daily reality, Cybersecurity Through Simulation offers... Read More >>
This book constitutes the proceedings of the First Nordic Energy Informatics Academy Conference, Nordic EIA 2025,... Read More >>
The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held... Read More >>
This book constitutes the refereed proceedings of the Second Conference on 2025 International Conference on Blockchain... Read More >>
In diesem Buch werden die Anforderungen an ein KI-gestütztes Zeitwirtschaftssystem am Beispiel einer internationalen... Read More >>
War no longer wears a uniform. From the battlefields of Ukraine to the deserts of Africa and the networks of cyberspace,... Read More >>
Bedrohungen erkennen, bevor sie eskalieren. Verantwortung übernehmen, bevor es zu spät ist. Stalking, sexualisierte... Read More >>
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders.... Read More >>
This open access book explores the transformative world of DAOs, where decentralized governance meets blockchain... Read More >>
This volume constitutes the proceedings of the 19th IFIP WG 11.12 International Symposium on Human Aspects of Information... Read More >>