Free Delivery Over $100
19607 books were found.
The Internet revolution has changed everything. As per the data, the United State household now has 5.7 Internet-connected... Read More >>
Read More >>
This book constitutes the refereed conference proceedings of the 12th International Conference on Computational... Read More >>
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography... Read More >>
Discusses the environment of the logistics industry in the context of new technologies and cybersecurity measures.... Read More >>
As cloud services become increasingly popular, safeguarding sensitive data has become paramount. Privacy Preservation... Read More >>
In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals... Read More >>
Unravels the complexities surrounding the cloud landscape, delving into the core concerns of security, privacy,... Read More >>
Explores the theoretical foundations and empirical studies surrounding the intersection of business intelligence... Read More >>
This book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and... Read More >>
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information... Read More >>
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference... Read More >>
Learn how to fortify your applications and protect against cyber threats with Secure Coding Practices, the ultimate... Read More >>
Dive into the dynamic world of cryptocurrencies with 'Exploring Altcoins and the Next Crypto Wave: Investing in... Read More >>
It’s not just computers—hacking is everywhere. Legendary cybersecurity expert and The New York Times best-selling... Read More >>
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability... Read More >>
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed... Read More >>
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners.... Read More >>
"""The Invisible Hand"" delves deep into the clandestine world of economic intelligence and industrial espionage,... Read More >>