Free Delivery Over $100
4024 books were found.
"In ""Crypto Crossroads, "" delve into the gripping saga of Binance, the world's leading cryptocurrency exchange,... Read More >>
"Description: ""Dive into the thrilling world of cryptocurrencies with 'Crypto 101, ' your comprehensive handbook... Read More >>
Bitcoin and The Trust Problem: Is Bitcoin adoption accelerated by the Abuse of Trust? This question might not... Read More >>
Cryptography is a technique of communication and information security that allows only the sender and the intended... Read More >>
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning... Read More >>
This book constitutes the proceedings of the 5th Conference on Creativity in Intellectual Technologies and Data... Read More >>
Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to. Book Description... Read More >>
This book has a multidisciplinary approach to Metaverse studies and the relevance of Metaverse with the current... Read More >>
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. Read More >>
Read More >>
"Blockchain na Prática: Seu Guia Passo a Passo para Dominar o Futuro Digital Em um mundo acelerado pela revolução... Read More >>
"In ""Bug Bounty Safari: Exploring the Wild World of Cybersecurity Rewards,"" author Juan Lane takes readers on... Read More >>
"In the ever-evolving battlefield of cyberspace, where digital adversaries lurk around every corner, there exists... Read More >>
"Welcome to ""Bitcoin: Mastering the World of Cryptocurrency - Your Ultimate Handbook on Bitcoin"". This e-book... Read More >>
This book includes extended and revised versions of a set of selected papers presented at the 19th International... Read More >>
"Unlock the Doors to Cybersecurity Mastery with ""Kali Linux for Beginners: A Practical Introduction to Ethical... Read More >>
This book offers the latest research results on analog side channels and their usage in cybersecurity. The first... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT... Read More >>
At some point in your career, you'll realize there's more to being a software engineer than dealing with code. Is... Read More >>