Computer security books

22873 books were found.

High-Level Synthesis Hardware Trojan Attacks and Countermeasures

High-Level Synthesis Hardware Trojan Attacks and Countermeasures...

Author: Anirban Sengupta (Full Professor, Indian Institute of Technology (IIT) Indore, India)
ISBN: 9781807050672
Format: Hardback
$382.80

This book presents information on hardware trojan attacks and their countermeasures, using high level synthesis....  Read More >>

AI-Driven Cybersecurity for Autonomous Systems

AI-Driven Cybersecurity for Autonomous Systems

Author: Toufik Mzili ,  Zahra Oughannou
ISBN: 9798337329239
Format: Paperback
$448.80

 Read More >>

ICT: Applications and Social Interfaces: Proceedings of ICTCS 2025, Volume 6

ICT: Applications and Social Interfaces: Proceedings...

Author: Amit Joshi ,  Roshan G. Ragel
ISBN: 9783032196774
Format: Paperback
$569.22

This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information...  Read More >>

ICT: Applications and Social Interfaces: Proceedings of ICTCS 2025, Volume 3

ICT: Applications and Social Interfaces: Proceedings...

Author: Amit Joshi ,  Roshan G. Ragel
ISBN: 9783032196804
Format: Paperback
$569.22

 Read More >>

ICT: Applications and Social Interfaces: Proceedings of ICTCS 2025, Volume 5

ICT: Applications and Social Interfaces: Proceedings...

Author: Amit Joshi ,  Roshan G. Ragel
ISBN: 9783032196897
Format: Paperback
$739.17

 Read More >>

Collaborative Computing: Networking, Applications and Worksharing: 21st EAI International Conference, CollaborateCom 2025, Shanghai, China, November 15–16, 2025, Proceedings, Part II

Collaborative Computing: Networking, Applications and...

Author: Honghao Gao ,  Xinheng Wang
ISBN: 9783032211705
Format: Paperback
$316.77

This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference...  Read More >>

Collaborative Computing: Networking, Applications and Worksharing: 21st EAI International Conference, CollaborateCom 2025, Shanghai, China, November 15–16, 2025, Proceedings, Part I

Collaborative Computing: Networking, Applications and...

Author: Honghao Gao ,  Xinheng Wang
ISBN: 9783032211675
Format: Paperback
$362.22

This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference...  Read More >>

Secure IT Systems: 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

Secure IT Systems: 30th Nordic Conference, NordSec 2025,...

Author: Raimundas Matulevičius ,  Liina Kamm
ISBN: 9783032147813
Format: Paperback
$155.22

This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025,...  Read More >>

Das Recht auf informationelle Selbstbestimmung in der Corona-Pandemie: Anforderungen des Vorbehalts des Gesetzes und Bestimmtheitsgebots an Kontaktdatenverarbeitungsregelungen in Rechtsverordnungen

Das Recht auf informationelle Selbstbestimmung in der...

Author: Johanna Sophie Materne
ISBN: 9783658509613
Format: Paperback
$197.97

Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung...  Read More >>

Histories of Computing in Asia: IFIP WG 9.7 International Workshop on the History of Computing, HC 2024, Phuket, Thailand, September 8–9, 2024, Revised Selected Papers

Histories of Computing in Asia: IFIP WG 9.7 International...

Author: Christopher Leslie
ISBN: 9783032194794
Format: Hardback
$336.35

This book constitutes the refereed proceedings of the IFIP WG 9.7 International Workshop on the History of Computing,...  Read More >>

Artificial Intelligence in Cybersecurity: Use AI to Protect Your Organization

Artificial Intelligence in Cybersecurity: Use AI to...

Author: Lisa Ventura
ISBN: 9781398624641
Format: Paperback
$68.95

 Read More >>

Information Systems: 22nd European, Mediterranean, and Middle Eastern Conference, EMCIS 2025, Paphos, Cyprus, September 11–12, 2025, Proceedings, Part I

Information Systems: 22nd European, Mediterranean, and...

Author: Paulo Rupino da Cunha ,  Marinos Themistocleous
ISBN: 9783032184832
Format: Paperback
$168.16

The two-volume set LNBIP 572 + 573 constitutes selected papers from the 22nd European, Mediterranean, and Middle...  Read More >>

We Know You Can Pay a Million: Inside the Dark Economy of Hacking and Ransomware

We Know You Can Pay a Million: Inside the Dark Economy...

Author: Anja Shortland
ISBN: 9781805224556
Format: Paperback
$42.99

A deeply informed, nail-biting expose of the multibillion-dollar hacking and ransomware industry  Read More >>

Digital Forensics Cookbook: Field-tested recipes for real-world investigations across Windows, macOS, Linux, iOS, and Android

Digital Forensics Cookbook: Field-tested recipes for...

Author: Cody Bounds
ISBN: 9781805127550
Format: Paperback
$118.77

Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack...  Read More >>

Unified Compliance: Protecting Global Consumer Data

Unified Compliance: Protecting Global Consumer Data...

Author: Christopher Quinn
ISBN: 9783112226155
Format: Paperback
$92.92

Unified Compliance was written to bridge the gap between technical implementation and regulatory understanding in...  Read More >>

Security Systems Technologies and Innovation: A Comprehensive History of Advances in the Industry

Security Systems Technologies and Innovation: A Comprehensive...

Author: Charles Schnabolk ,  Stefanie Coakes
ISBN: 9780367548988
Format: Hardback
$242.00

Security Systems Technologies and Innovation: A Comprehensive History of Advances looks at the last 50 years and...  Read More >>

Red Team Engineering: The Art of Building Offensive Tools and Infrastructure

Red Team Engineering: The Art of Building Offensive...

Author: Casey Erdmann
ISBN: 9781718504264
Format: Paperback
$180.00

A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration...  Read More >>

Cryptographic Algorithms: Elliptic and Jacobian, Elliptic Curve Cryptography and Computational Security

Cryptographic Algorithms: Elliptic and Jacobian, Elliptic...

Author: Anita Tomar ,  Ankur Nehra
ISBN: 9783119142878
Format: Paperback
$248.13

This book explores cryptographic techniques by integrating Elliptic and Jacobian Elliptic Curve Cryptography with...  Read More >>

Use of GNN to automate SSDLC Alert Dismissal Review Process: Study on the Usage & Efficacy of Novel Deep Learning Techniques in Appsec

Use of GNN to automate SSDLC Alert Dismissal Review...

Author: Devjyoti Raha
ISBN: 9783658514952
Format: Paperback
$263.97

The work grew out of a very practical problem: the AppSec team was drowning in security scanning alerts but still...  Read More >>

Code War: How Nations Hack, Spy, and Shape the Digital Battlefield

Code War: How Nations Hack, Spy, and Shape the Digital...

Author: Allie Mellen
ISBN: 9781394285570
Format: Hardback
$57.95

An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List