Free Delivery Over $100
4195 books were found.
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine... Read More >>
Cyberspace and National Security brings together scholars, policy analysts, and information technology executives... Read More >>
Read More >>
"To most Americans, the NSA is an organization shrouded in secrecy, where the most clandestine of operations are... Read More >>
Learn Hacking Quick and Easy Without Feeling Overwhelmed You've been reading a lot on the internet about hacking... Read More >>
The content of this series is designed to immerse the reader into an interactive environment where they will be... Read More >>
This is a 3 book bundle related to Blockchain, hacking computers and hacking mobile devices, apps, and game consoles!... Read More >>
Cryptography is the interesting study of different methods of secure communication. It concentrates on making and... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application... Read More >>
From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War... Read More >>
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's... Read More >>
Limited Time Offer - only $5.99! Are you having trouble keeping track of the passwords and usernames you create... Read More >>
Bring Your Own Device (BYOD) strategies to today's increasingly rigorous compliance requirements. Throughout, you'll... Read More >>
Helping current and future system designers take a more productive approach in the field, Communication System Security... Read More >>
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual... Read More >>
Boolean functions are the building blocks of symmetric cryptographic systems. This book shows how Boolean functions... Read More >>
Mind the gap...between the actual level of cybersecurity and the amount required to protect you. Ever wondered why... Read More >>