Computer security books

20683 books were found.

Towards new e-Infrastructure and e-Services for Developing Countries: 14th EAI International Conference, AFRICOMM 2022, Zanzibar, Tanzania, December 5-7, 2022, Proceedings

Towards new e-Infrastructure and e-Services for Developing...

Author: Rashid A. Saeed ,  Abubakar D. Bakari
ISBN: 9783031348952
Format: Paperback
$232.85

This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure...  Read More >>

Cybersecurity and Identity Access Management

Cybersecurity and Identity Access Management

Author: Bharat S. Rawal ,  Gunasekaran Manogaran
ISBN: 9789811926600
Format: Paperback
$181.10

 Read More >>

Perspectives on Ethical Hacking and Penetration Testing

Perspectives on Ethical Hacking and Penetration Testing...

Author: Keshav Kaushik ,  Akashdeep Bhardwaj
ISBN: 9781668482186
Format: Hardback
$380.60

Familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses...  Read More >>

Effective Cybersecurity Operations for Enterprise-Wide Systems

Effective Cybersecurity Operations for Enterprise-Wide...

Author: Festus Fatai Adedoyin ,  Bryan Christiansen
ISBN: 9781668490181
Format: Hardback
$400.40

"Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks...  Read More >>

Confronting Security and Privacy Challenges in Digital Marketing

Confronting Security and Privacy Challenges in Digital...

Author: Paulo Botelho Pires ,  José Duarte Santos
ISBN: 9781668489581
Format: Hardback
$400.40

Marketing, and specifically its digital marketing component, is being challenged by disruptive innovations, which...  Read More >>

Careers in Cybersecurity

Careers in Cybersecurity

Author: Salem Press
ISBN: 9781637004128
Format: Hardback
$200.20

 Read More >>

Group Theory

Group Theory

Author: Dinesh Khattar ,  Neha Agrawal
ISBN: 9783031213069
Format: Hardback
$206.97

The contents focus on the properties of groups, subgroups, cyclic groups, permutation groups, cosets and Lagrange’s...  Read More >>

AI for Big Data-Based Engineering Applications from Security Perspectives

AI for Big Data-Based Engineering Applications from...

Author: Balwinder Raj ,  Brij B. Gupta (Director, International Center for AI & CCRI)
ISBN: 9781032136134
Format: Hardback
$231.00

This book emphasizes the idea of understanding the motivation of the advanced circuits’ design to establish the...  Read More >>

Hardware Security Training, Hands-on!

Hardware Security Training, Hands-on!

Author: Mark Tehranipoor, P.h.D ,  N. Nalla Anandakumar
ISBN: 9783031310331
Format: Hardback
$168.16

This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing...  Read More >>

AI and Cyber Warfare: New Terrain and Tactics for Defense

AI and Cyber Warfare: New Terrain and Tactics for Defense...

Author: Brad Campbell
ISBN: 9798856373003
Format: Paperback
$39.57

"""AI and Cyber Warfare: New Terrain and Tactics for Defense"" - a Special Report penned by the thought leader and...  Read More >>

The Crypto Trader: How anyone can make money trading Bitcoin and other cryptocurrencies

The Crypto Trader: How anyone can make money trading...

Author: Goodman
ISBN: 9789732346587
Format: Paperback
$131.97

"""Profitable crypto trading secrets revealed by renowned industry expert."""  Read More >>

Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide

Demystifying Intelligent Multimode Security Systems:...

Author: Jody Booth ,  Werner Metz
ISBN: 9781484282960
Format: Paperback
$158.37

 Read More >>

Mastering Microsoft 365 Defender: Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats

Mastering Microsoft 365 Defender: Implement Microsoft...

Author: Ru Campbell ,  Viktor Hedberg
ISBN: 9781803241708
Format: Paperback
$131.97

Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and...  Read More >>

Das RSA-Verfahren: Verschlüsseln und Entschlüsseln auf Basis der Algebra: Klartext für Nichtmathematiker

Das RSA-Verfahren: Verschlüsseln und Entschlüsseln auf...

Author: Guido Walz
ISBN: 9783662673621
Format: Paperback
$47.49

 Read More >>

Hacking the Future: Exploring the World of Ethical Hacking

Hacking the Future: Exploring the World of Ethical Hacking...

Author: Annie A Stringer
ISBN: 9798853875739
Format: Paperback
$31.65

Hacking the Future: Exploring the World of Ethical Hackin  Read More >>

Artificial Intelligence and Deep Learning for Computer Network: Management and Analysis

Artificial Intelligence and Deep Learning for Computer...

Author: Sangita Roy (TIET, Patiala, Punjab, India) ,  Rajat Subhra Chakraborty (IIT KGP, India)
ISBN: 9781032079592
Format: Hardback
$210.00

This reference text aims to systematically collect quality research spanning AI, ML and Deep Learning (DL) applications...  Read More >>

Securing the Internet of Things Environment against RPL Attacks

Securing the Internet of Things Environment against...

Author: Rashmi Sahay
ISBN: 9781916706286
Format: Paperback
$81.84

"Kevin Ashton first coined the term Internet of Things in his presentation on automating the supply chain processes...  Read More >>

SRv6 Network Programming: Ushering in a New Era of IP Networks

SRv6 Network Programming: Ushering in a New Era of IP...

Author: Zhenbin Li ,  Zhibo Hu
ISBN: 9781032016351
Format: Paperback
$94.99

The book collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6....  Read More >>

The Routledge Handbook of Privacy and Social Media

The Routledge Handbook of Privacy and Social Media

Author: Sabine Trepte (University of Hohenheim, Germany) ,  Philipp Masur (Vrije Universiteit Amsterdam, Netherlands)
ISBN: 9781032111612
Format: Hardback
$462.00

This volume provides the basis for contemporary privacy and social media research and informs global as well as...  Read More >>

Counterintelligence in a Cyber World

Counterintelligence in a Cyber World

Author: Paul A. Watters
ISBN: 9783031352867
Format: Hardback
$142.29

This book provides an outline of the major challenges and methodologies for applying classic counterintelligence...  Read More >>

Security and Risk Analysis for Intelligent Edge Computing

Security and Risk Analysis for Intelligent Edge Computing...

Author: Gautam Srivastava ,  Uttam Ghosh
ISBN: 9783031281495
Format: Hardback
$388.10

This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems.  Read More >>

Crime in Cyberspace an Analytical Study

Crime in Cyberspace an Analytical Study

Author: Bagga Rajni
ISBN: 9798889952954
Format: Paperback
$121.44

"""Crime in Cyberspace: An Analytical Study"" is a comprehensive and insightful book that delves into the world...  Read More >>

Security Management System of Cyber Cafes

Security Management System of Cyber Cafes

Author: Maddel M Manisha
ISBN: 9798889952961
Format: Paperback
$95.04

"""Security Management System of Cyber Cafes"" is a comprehensive and practical guide that outlines effective strategies...  Read More >>

Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits

Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits...

Author: Josh Luberisse
ISBN: 9798223168249
Format: Paperback
$197.97

"Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity...  Read More >>

Blockchain Scalability

Blockchain Scalability

Author: Wuhui Chen ,  Zibin Zheng
ISBN: 9789819910588
Format: Hardback
$448.77

This book focuses on conducting a comprehensive analysis of blockchain scalability serving large-scale application...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List