Free Delivery Over $100
20683 books were found.
The papers are organized in the following topical sections:Part I: Digital signatures; Part II: Cloud cryptography;... Read More >>
This book provides an analysis of the origin and effect of human errors in engineering. Using cases from everyday... Read More >>
The Hack is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques... Read More >>
Read More >>
In a rapidly evolving digital landscape, the convergence of artificial intelligence (AI) and security presents both... Read More >>
This book offers a thorough examination of the potential of blockchain to transform musical practices. Moving beyond... Read More >>
A must-read for anyone in the health and wellness industry, highlighting the importance of cybersecurity and providing... Read More >>
As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative... Read More >>
Gain a solid understanding of the threat landscape and discover best practices to protect your software factory... Read More >>
Uncover history, principles, and cutting-edge insights in this new edition. Read More >>
A foundational new collection examining the mechanics of privacy in the digital age. The falling costs of collecting,... Read More >>
A broad introduction to cryptography what it is, how it really works, what its future holds, and why every informed... Read More >>
This book is a comprehensive review of ransomware that covers ransomware from every angle. Read More >>
This book presents state-of-the art, high-level synthesis methodologies for hardware security and trust, including... Read More >>
The digital age has ushered in an era of incredible innovation, but it's also opened the door to new threats. Deepfakes,... Read More >>
In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing... Read More >>
This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. Finally,... Read More >>