Free Delivery Over $100
2045 books were found.
This book addresses the question of how competition authorities assess mergers in the Information Communication... Read More >>
Covering the diverse realms that chief officers need to know and the specifics applicable to singular areas of departmental... Read More >>
Defines 802.1X port-based authentication concept and explores its various applications to computer networks using... Read More >>
Das BGB in seiner jetzigen Form ist der Digitalisierung im Hinblick auf digitale Inhalte nicht gewachsen. Es besteht... Read More >>
In today’s interactive network environment, where various types of organizations are eager to monitor and track... Read More >>
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if... Read More >>
Presents an overview of the elements that one needs to address to respond to network and information security violations.... Read More >>
Read More >>
Provides the skills necessary to develop a comprehensive strategy for updating and securing Microsoft systems with... Read More >>
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy,... Read More >>
Exploring how justice is delivered at a time of rapid technological transformation, Justice in the Digital State... Read More >>
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and... Read More >>
The ever-increasing use of technology is challenging the current status of the law, bringing about new problems... Read More >>
This book provides a critical overview of the changing ways people mourn, commemorate and interact with the remains... Read More >>
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography... Read More >>
rather, its study should reflect the complexity of the networks of actors, norms and resources involved, as well... Read More >>
This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified... Read More >>
This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental... Read More >>
This book describes the need of copyright protection for multimedia objects and develops an invisible image watermarking... Read More >>
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference... Read More >>
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security,... Read More >>
This book discusses the main legal questions raised by free and open source software (FOSS) licenses and other alternative... Read More >>
This topical book critically examines the regulatory framework for generic Top-Level Domains (gTLDs) on the Internet.... Read More >>