Free Delivery Over $100
2045 books were found.
Internet of Things (IoT) has become a valuable tool for connection and information exchange between devices. This... Read More >>
In Gestalt der klassischen Rechtsgebiete des Schuldrechts, Strafrechts, Arbeitsrechts und des Persönlichkeitsschutzes,... Read More >>
The book introduces a new methodology to help critical infrastructure owners, operators, and security practitioners... Read More >>
This practical guide to the DPO role encompasses the key activities you’ll need to manage to succeed as a DPO. Coverage... Read More >>
Maintaining a practical perspective along with theoretical explanations, this book explores the concepts, discussion,... Read More >>
This book constitutes revised selected papers from the 14th International Global Sourcing Workshop 2019, held in... Read More >>
This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis... Read More >>
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to... Read More >>
Many companies move workloads to the cloud only to encounter issues with legacy processes and organizational structures.... Read More >>
This book is a practical, readable guide that will help all parents have confidence to successfully navigate technology... Read More >>
This book sheds light upon the security threats, defenses, and remediation on various networking and data processing... Read More >>
Read More >>
This book brings together three academic fields – Public Administration, Criminal Justice and Urban Governance –... Read More >>
Forensic Document Examination in the 21st Century is designed as a resource for the forensic document examiners,... Read More >>
This book seeks to provide and promote a better understanding and a more responsive and inclusive governance of... Read More >>
Internet of Things (IoT) is expanding at a rapid rate and it is becoming increasingly important for professionals... Read More >>
Cyber attacks are rapidly increasing in sophistication and magnitude. The last few years having seen a ransomware... Read More >>
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third... Read More >>
This book identifies and explains the different national approaches to data protection – the legal regulation of... Read More >>
This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information... Read More >>
This book explains the communication cycle of fake news - how and why it is created, disseminated, accessed, and... Read More >>