Free Delivery Over $100
10062 books were found.
API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify... Read More >>
Read More >>
This book discusses the use of artificial intelligence (AI) for security purposes. It discusses the offensive use... Read More >>
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet... Read More >>
Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development... Read More >>
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures. Read More >>
Lastly, a selection of future directions are examined that may be used by the trusted execution environments of... Read More >>
This book examines new and challenging political aspects of cyber security and presents it as an issue defined by... Read More >>
This textbook offers the knowledge and the mathematical background or techniques that are required to implement... Read More >>
This book introduces cutting-edge methods on security in spectrum management, mobile networks and next-generation... Read More >>
This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with... Read More >>
This book aims to explore the next generation of online learning challenges including the security and privacy issues... Read More >>
The Ultimate Guide to Modern IT ManagementUnlock the full potential of Microsoft Intune and revolutionize your approach... Read More >>
This book focuses on security science and technology, data and information security, and mobile and network security... Read More >>
Two bestselling CISSP guides in one serious study set This value-packed packed set for the serious CISSP certification... Read More >>
In diesem Buch erfahren Sie auf leicht verständliche Weise, wie Sie Ihre digitalen Geräte und persönlichen Daten... Read More >>
Cryptography has crept into everything, from Web browsers and e-mail programs to cell phones, bank cards, and cars.... Read More >>
This volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference on Information... Read More >>
The book suggests conceptual approaches and methods of studying computer security which contribute to current debates... Read More >>
"En la era digital actual, la ciberseguridad ya no es un lujo, sino una necesidad para los propietarios de peque�as... Read More >>
"In ""The Data Breach,"" dive deep into the unsettling realities of cybersecurity threats that have jeopardized... Read More >>
"Preventing Ransomware: A Practical Guide for Everyone In today's digital age, ransomware poses a significant threat... Read More >>