Free Delivery Over $100
22966 books were found.
The scale and speed of modern cyber threats have surpassed human capacity. Artificial intelligence has become essential... Read More >>
Buy this for your Mum. Buy this for your Dad. Scams are no longer a tech problem. They are an everyday life problem.... Read More >>
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information... Read More >>
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International... Read More >>
The Third Annual AI Workshop at Embry‑Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA,... Read More >>
Read More >>
This book features original, peer-reviewed research papers presented at the International Conference on Recent Trends... Read More >>
This two-volume set LNICST 680-681 constitutes the refereed proceedings of the 21st EAI International Conference... Read More >>
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025,... Read More >>
Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung... Read More >>
This book constitutes the refereed proceedings of the IFIP WG 9.7 International Workshop on the History of Computing,... Read More >>
Develop the skills to stop AI-powered cyberattacks and leverage AI to improve your existing cybersecurity strategies.... Read More >>
The two-volume set LNBIP 572 + 573 constitutes selected papers from the 22nd European, Mediterranean, and Middle... Read More >>
A deeply informed, nail-biting expose of the multibillion-dollar hacking and ransomware industry Read More >>
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack... Read More >>
Security Systems Technologies and Innovation: A Comprehensive History of Advances looks at the last 50 years and... Read More >>
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration... Read More >>
An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical... Read More >>
This two volume constitutes the refereed proceedings of the 18th International Symposium on Foundations and Practice... Read More >>