Free Delivery Over $100
10062 books were found.
Read More >>
Bei komplexen und vor allem sicherheitsrelevanten IT-Infrastrukturen reichen diese technischen Maßnahmen allein... Read More >>
This book constitutes the proceedings of the 30th International Conference on Web Services, ICWS 2023, held as Part... Read More >>
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges... Read More >>
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a... Read More >>
This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from... Read More >>
WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places... Read More >>
Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline... Read More >>
"""The Glossary of Networking"" is your definitive guide to navigating the intricate world of networking with precision... Read More >>
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference... Read More >>
Cyber security is a vital aspect of the modern digital world, as it protects our data, systems, and networks from... Read More >>
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication... Read More >>
"Embark on an illuminating journey through the captivating realm of ""Mastering Ethical Hacking: Concepts, Techniques,... Read More >>
This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems... Read More >>
This book comprises the select proceedings of the 2nd International Conference on Cybersecurity and Evolutionary... Read More >>
The two concepts presented in the book - the citizen privacy profile framework and the prototype fuzzy-based privacy... Read More >>
Secure Intelligent Machines Protecting AI from Cyberattack We are poised on the edge of the greatest transformation... Read More >>
This open access book constitutes the proceedings of the 8th International Joint Conference on Electronic Voting... Read More >>
This book focuses on practical implementation details, telecommunication techniques, security and technology challenges... Read More >>
This book introduces research presented at the International Conference on Distributed Computing and Optimization... Read More >>
Organizations that conduct business online are constantly engaged in a cat-and-mouse game with these invaders. In... Read More >>