Free Delivery Over $100
2045 books were found.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market... Read More >>
The integration of robotic and artificial intelligent systems in healthcare settings is accelerating. Read More >>
Read More >>
The book provides a detailed overview and analysis of important EU Internet regulatory challenges currently found... Read More >>
Traces the history of government profiling, the effects of contemporary technologies on surveillance practices,... Read More >>
"There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate... Read More >>
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both... Read More >>
Emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. This... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques... Read More >>
This new edition covers the latest case law on open source software and standard essential patents and features... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory... Read More >>
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet... Read More >>
This book presents data driven methods, especially machine learning, for understanding and approaching the high... Read More >>
This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines... Read More >>
Drawing from law, science and technology studies, cultural studies, and information studies to develop a complex... Read More >>
In light of the legislation such as the Federal Information Security Management Act (FISMA), there is an increased... Read More >>
Covers the complex security issues that face the mobile communications industry. This book discusses hacking and... Read More >>
Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring... Read More >>
Detailing a comprehensive set of requirements for secure and resilient software development and operation, this... Read More >>
Previous information security references do not address the gulf between general security awareness and the specific... Read More >>
Information security teams are charged with developing and maintaining a set of documents that will protect the... Read More >>
By allowing digital signatures to be as valid as handwritten signatures, public key infrastructure (PKI) provides... Read More >>
Examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers,... Read More >>