Free Delivery Over $100
20683 books were found.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference... Read More >>
"Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity... Read More >>
了解如何在雲端或 Raspberry Pi 上搭建自己的 VPN 伺服器 本書是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器的分步指南(繁體版)。基於 10 年和擁有數百萬用戶的開源工作,本書將幫助你在幾分鐘內搭建自己的... Read More >>
This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). The... Read More >>
This book presents high-quality research papers presented at the Second International Conference on Smart Computing... Read More >>
Read More >>
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition... Read More >>
"""Scalable Framework for Cyber Threat Situational Awareness"" is a comprehensive and practical guide that explores... Read More >>
"3C Customized Cascaded Cryptography for Mobile Application"" is an authoritative and comprehensive guide that explores... Read More >>
"Embark on a thrilling journey into the world of modern blockchain technology with our latest book, ""Modern Innovations:... Read More >>
In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced... Read More >>
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with... Read More >>
This book is a compilation of selected papers from the Seventh Symposium on Digital Instrumentation and Control... Read More >>
Wir alle kennen Hacking-Gadgets aus diversen Filmen und Serien - kurz ein Gerät am PC angebracht und schon ist das... Read More >>
Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new... Read More >>
The book presents selected papers from the 18th International Conference on Intelligent Information Hiding and Multimedia... Read More >>
"""Intrusion Detection and IP Traceback Schemes for Cybersecurity"" is a comprehensive and authoritative book that... Read More >>
"Cybersecurity Awareness, without the rocket science. If you think that the latest Cybersecurity software alone... Read More >>
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The... Read More >>
Maybe you've considered adopting zero trust as a guiding principle for architecting a secure network but aren't... Read More >>
"Public Key Infrastructure (PKI) has a rich history, spanning back to the 1970s. Despite experiencing widespread... Read More >>