Free Delivery Over $100
22973 books were found.
Read More >>
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025,... Read More >>
Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung... Read More >>
This book constitutes the refereed proceedings of the IFIP WG 9.7 International Workshop on the History of Computing,... Read More >>
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack... Read More >>
The two-volume set LNBIP 572 + 573 constitutes selected papers from the 22nd European, Mediterranean, and Middle... Read More >>
Security Systems Technologies and Innovation: A Comprehensive History of Advances looks at the last 50 years and... Read More >>
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration... Read More >>
An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical... Read More >>
Off-the-record sabotage, hidden naval fleets, and targeted cyber intrusions: these escalating assaults remain shadowy... Read More >>
This book constitutes the proceedings of the 27th International Conference on Passive and Active Measurement, PAM... Read More >>
A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet... Read More >>
The Basics of Hacking and Penetration Testing Read More >>
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International... Read More >>
This book constitutes the revised selected papers of the 18th International Conference, SecITC 2025, held in Bucharest,... Read More >>
This book constitutes the proceedings of the 7th International Conference on Machine Learning for Cyber Security,... Read More >>
This book constitutes the refereed proceedings of the 28th International Conference on Information Security and... Read More >>
A deeply informed, nail-biting expose of the multibillion-dollar hacking and ransomware industry Read More >>
Delve into fundamental computer security concepts through detailed discussions of cryptography, network security,... Read More >>
The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to... Read More >>
In Deep Learning with PyTorch, Second Edition, you’ll learn how to create your own neural network and deep learning... Read More >>