Free Delivery Over $100
19724 books were found.
Read More >>
The Internet revolution has changed everything. As per the data, the United State household now has 5.7 Internet-connected... Read More >>
Join us in the beginning of a conversation and what we hope will be a community dedicated to leveraging some of... Read More >>
Discusses the environment of the logistics industry in the context of new technologies and cybersecurity measures.... Read More >>
A timely and indispensable resource offering a holistic approach to tackling the security challenges of the digital... Read More >>
As cloud services become increasingly popular, safeguarding sensitive data has become paramount. Privacy Preservation... Read More >>
Explores the theoretical foundations and empirical studies surrounding the intersection of business intelligence... Read More >>
Discover Web3 using managed cloud platforms for decentralized and provenance use cases. This book delves into hosting... Read More >>
"In a world where our phones can be used for anything, from checking the weather to finding a drug store, we have... Read More >>
"""The Digital Revolution: How Technology is Reshaping Our World"" is a compelling and insightful exploration of... Read More >>
Nuggets of information, such as contextual case studies, important statistics, critical definitions and crucial... Read More >>
"""You are being surveilled right now. This sweeping expose reveals how the U.S. government allied with data brokers,... Read More >>
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information... Read More >>
"""Earning Online: From Side Hustle to Full-Time Income"" is a comprehensive guide for anyone looking to leverage... Read More >>
The book examines 22 cutting-edge technological trends that will influence the future, such as digital twins and... Read More >>
Survivalist's Handbook of DIY Projects for Preparedness and Cyber Threats Awareness. Are you ready for anything?... Read More >>
"Embark on an immersive journey into the world of ethical hacking with ""Infrastructure Attack Strategies for Ethical... Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
The three-volume set LNICST 561, 562 563 constitutes the refereed post-conference proceedings of the 19th EAI International... Read More >>