Free Delivery Over $100
19718 books were found.
"In a world where our phones can be used for anything, from checking the weather to finding a drug store, we have... Read More >>
"""The Digital Revolution: How Technology is Reshaping Our World"" is a compelling and insightful exploration of... Read More >>
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information... Read More >>
"""Earning Online: From Side Hustle to Full-Time Income"" is a comprehensive guide for anyone looking to leverage... Read More >>
Beginning-Intermediate user level Read More >>
The book examines 22 cutting-edge technological trends that will influence the future, such as digital twins and... Read More >>
Survivalist's Handbook of DIY Projects for Preparedness and Cyber Threats Awareness. Are you ready for anything?... Read More >>
"Embark on an immersive journey into the world of ethical hacking with ""Infrastructure Attack Strategies for Ethical... Read More >>
This book constitutes the proceedings of the 22nd International Conference on Smart Card Research and Advanced Applications,... Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
"In an era where digital threats loom large, this comprehensive book provides a holistic exploration of the fundamentals,... Read More >>
"Introducing the ""Trojan Exposed"" Book Bundle: Your Ultimate Defense Against Cyber Threats! ����️ Are you concerned... Read More >>
Read More >>
Multimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection,... Read More >>
This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the... Read More >>
Spätestens seit den massiven Desinformationsangriffen auf westliche Impfstoffhersteller während der Coronapandemie... Read More >>
Facial recognition technology is increasingly used for identity verification and identification, from aiding law... Read More >>
Unlock the Power of Network Security with the NMAP Network Scanning Series! Welcome to the Network Security, Monitoring,... Read More >>
This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing... Read More >>
"���� Wireless Exploits and Countermeasures Book Bundle ���� Unveil the Secrets of Wireless Security with Our Comprehensive... Read More >>
This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography,... Read More >>
"Our lives are now deeply intertwined with the digital world, and technology's power has given us access to unparalleled... Read More >>