Free Delivery Over $100
20683 books were found.
This book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security, Cryptology,... Read More >>
Read More >>
Proof techniques in cryptography are very difficult to understand even for students or researchers who major in... Read More >>
Illuminates the most effective and practical applications of artificial intelligence (AI) in securing critical cyber... Read More >>
This book describes in detail the architectural design, technical implementation, planning and design, and deployment... Read More >>
This book is designed for readers who have an interest in the cyber security domain, including students and researchers... Read More >>
This book provides every necessary detail required to develop the secure searchable encryption scheme using both... Read More >>
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences.... Read More >>
The ability to make both individuals and consumers more secure online and on computer networks is a crying need... Read More >>
This book contains best selected research papers presented at ICTCS 2022: Seventh International Conference on Information... Read More >>
This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS... Read More >>
The book contains three chapters, devoted to the following topics:- Development of the Cyber Resilience Management... Read More >>
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing... Read More >>
Examines current risks involved in the cybersecurity of various business systems today from a global perspective... Read More >>
Explores the status of blockchain technology and builds business models to secure the future direction in the field... Read More >>
One data breach can close a small business before it even gets going. With all that is involved in starting a new... Read More >>
Former National Security Agency intelligence officer Dr Leslie Gruis explains the origins of American privacy and... Read More >>
Cloak-and-dagger, high tech, and big business converge in this revelatory, page-turning account of a new kind of... Read More >>
It covers key areas such as governance and management of IT, information systems acquisition, development, implementation... Read More >>
Machine learning (ML) models, especially large pretrained deep learning (DL) models, are of high economic value... Read More >>