Free Delivery Over $100
10767 books were found.
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications... Read More >>
Read More >>
The book starts with an introduction to hacking and explaining the types of hackers. This is followed by: Using... Read More >>
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled... Read More >>
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get... Read More >>
A nuts-and-bolts explanation of cryptography from a leading expert in information security. Read More >>
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector... Read More >>
Mi libro perfecto de contrasenas. Cuantas veces no nos a pasado que tenemos muchas cuentas en redes sociales, bancos,... Read More >>
With its lively, conversational tone and practical focus, this edition mixes applied and theoretical aspects for... Read More >>
"The book you have been waiting for to make you a Master of TShark Network Forensics, is finally here!!! Be it you... Read More >>
The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual... Read More >>
Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You... Read More >>
Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public... Read More >>
The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers... Read More >>
Vous avez toujours voulu apprendre a pirater un reseau Wi-Fi protege par un mot de passe ? Vous etes-vous deja demande... Read More >>
How to survive the digital revolution without getting trampled: your guide to online mindfulness, digital self-empowerment,... Read More >>
This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications,... Read More >>
This open access book describes the technologies needed to construct a secure big data infrastructure that connects... Read More >>
Keep all your passwords, user IDs, and more all together in this one perfect logbook, which also features important... Read More >>
Es el libro para mantener toda la informacion de tu contrasena... Read More >>
Protecting Your Internet Identity: Are You Naked Online? helps readers, young and old alike, understand the implications... Read More >>