Free Delivery Over $100
2045 books were found.
The book brings together an interdisciplinary collection of chapters that revolve around the potential influence... Read More >>
Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements... Read More >>
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective... Read More >>
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents... Read More >>
Antivirus software uses algorithms to detect viruses Reactively adaptive malware deploys those algorithms to outwit... Read More >>
Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting... Read More >>
This book provides a modern alternative to the fortress approach to security. The new approach is more distributed... Read More >>
Securing social networks and ensuring the privacy of participants has become a crucial need. There are no books... Read More >>
Electronically Stored Information, Second Edition explains the reasons you need to know about electronic data. It... Read More >>
This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter... Read More >>
Read More >>
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and... Read More >>
Computational Legal Studies offers a visionary introduction to the computational turn in law and the resulting emergence... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
This groundbreaking book explores the new legal and economic challenges triggered by big data, and analyses the... Read More >>
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative... Read More >>
This book outlines the legal powers of a major Western nation – Australia – to collect and use location information.... Read More >>
This section examines how traditional evidentiary law is affected by both new ways of investigation – based on automated... Read More >>
Dieses Buch analysiert und bewertet die Rechtslage zur Durchführung medizinischer Behandlungen bei örtlichem und/oder... Read More >>
This timely book addresses the increasingly widespread issue of online political hatred in Europe. Taking an interdisciplinary... Read More >>
This book addresses the question of how competition authorities assess mergers in the Information Communication... Read More >>
This book provides a comprehensive textbook on Distributed Denial of Service (DDoS) attacks. It will present both... Read More >>