Free Delivery Over $100
20683 books were found.
Read More >>
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy... Read More >>
This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights... Read More >>
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches... Read More >>
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor... Read More >>
Cyber-security and its related threats change constantly. The book aims at using practical contemporary machine... Read More >>
Data Privacy Decoded: Navigating Laws and Regulations stands out as a comprehensive roadmap through the labyrinth... Read More >>
This book offers the latest research results on analog side channels and their usage in cybersecurity. The first... Read More >>
The book commences with an introductory section on reconfigurable computing and thereafter delves into its applications... Read More >>
Discover the rivalries, conflicts and success stories from the fascinating world of fintech, from cryptocurrencies... Read More >>
While the deployment of large-scale biometric systems in both commercial and government applications has increased... Read More >>
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology... Read More >>
This book explores the efficacy of cybersecurity and anti-phishing training and awareness programs, as well as internal... Read More >>
This open access book is authored by a rich mix of contributors from across the landscape of research, academia,... Read More >>
It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18... Read More >>
This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that... Read More >>
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically... Read More >>
A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed... Read More >>
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door... Read More >>