Free Delivery Over $100
4195 books were found.
"""The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of... Read More >>
explains how the network design paradigm for smart grids differs from that for more established data networks, and... Read More >>
Read More >>
Where do data/privacy breaches commonly occur? How do you avoid them happening to you? Real-life cases (with hefty... Read More >>
This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security... Read More >>
This two volume set LNCS 9827 and LNCS 9828 constitutes the refereed proceedings of the 27th International Conference... Read More >>
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS... Read More >>
This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded... Read More >>
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception.... Read More >>
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on... Read More >>
CYBER SECURITY will help you learn exactly what steps you, as a leader, can take to properly prepare your organization... Read More >>
Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! About This Book... Read More >>
The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference... Read More >>
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how... Read More >>
The second section covers the formal verification of the security and resiliency of smart grid control systems by... Read More >>