Free Delivery Over $100
10767 books were found.
This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and... Read More >>
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography.... Read More >>
This volume addresses the challenges associated with methodology and application of risk and resilience science... Read More >>
With this practical guide, embedded and mobile engineers will learn how to program an Android phone and an Arduino... Read More >>
There are so many different elements that go into forming an online platform, but there are many traps that writers... Read More >>
Protecting Your Business From Insider Threats In Seven Effective Steps is one of the first books that addresses... Read More >>
Read More >>
Are you tired of losing track of the user names and passwords you create every time you visit a new website? Now... Read More >>
This book presents advances in the field of optical networks - specifically on research and applications in elastic... Read More >>
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis... Read More >>
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual... Read More >>
Hackers reported as working on behalf of the Russian Government have attacked a wide variety of American citizens... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security... Read More >>
This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held... Read More >>
Developing an information security program that adheres to the principle of security as a business enabler must... Read More >>
Identity theft is increasingly turning to a regular issue of concern as fraudsters discover more and more ways of... Read More >>
This edited book investigates the lack of interoperability in the IoT realm, including innovative research as well... Read More >>
Describes the availability of personnel with cyber skills in the private sector and the number of Army reserve component... Read More >>
Forgot your Password? Now you can easily recover access to websites and any internet address while keeping your... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on... Read More >>