Free Delivery Over $100
2045 books were found.
This book intends to unite studies in different fields related to the development of the relations between logic,... Read More >>
CI DSS is now in its 18th year and it is continuing to dominate corporate security budgets and resources. If you... Read More >>
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned... Read More >>
The book provides a snapshot of practices used by contemporary designers, researchers, and artists who create objects,... Read More >>
The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address... Read More >>
This book sheds light upon the security threats, defenses, and remediation on various networking and data processing... Read More >>
Read More >>
This text covers fundamentals of Python up to object-oriented concepts including regular expression, and applications... Read More >>
This book presents new cyber-physical security findings for Industry 4.0 using emerging technologies like Artificial... Read More >>
Artificial intelligence and machine learning are becoming more present in society today and are expected to become... Read More >>
Soziale Netzwerke haben eine Fülle von Problemen in Bezug auf die Privatsphäre und den Schutz personenbezogener... Read More >>
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security,... Read More >>
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative... Read More >>
This book uses a crime science approach to explore the ways in which child sexual abuse material can be tackled.... Read More >>
The book analyzes the most relevant developments in the relation between contracts and technology, from automatically... Read More >>
This book examines the evolution of legal institutions in containing and tackling fraudulent activities plaguing... Read More >>
This book is a concise introduction to emerging concepts and ideas found at the intersection of contemporary behavioural... Read More >>
An explanation of the five pillars or battlefields of Cybersecurity and how a Zero Trust approach can change the... Read More >>
The aim of this book is to inform readers about mHealth, from its history to the current research developments and... Read More >>
"Managing the Insider Threat: No Dark Corners and the Rising Tide Menace, Second Edition follows up on the success... Read More >>