Free Delivery Over $100
10336 books were found.
Internet Password Address Book Discreet Notebook Easily to Find What you are looking Directory Alphabetical 5 inches... Read More >>
Read More >>
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including... Read More >>
The analysis of violence at state and local levels reveals a fractal pattern of overlapping ecosystems of conflict... Read More >>
Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning,... Read More >>
Security threats are a significant problem for information technology companies today. This book focuses on how... Read More >>
From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines... Read More >>
This work provides an assessment of the current state of near field communication (NFC) security, it reports on... Read More >>
More and more consumers and businesses are being victimized by increasingly sophisticated email scams, including... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental... Read More >>
It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using... Read More >>
A work from Cengage Learning on hands-on ethical hacking and network defense. Read More >>
What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in... Read More >>
This book constitutes the most visionary papers of the AAMAS 2016 Workshops, held in Singapore, Singapore, in May... Read More >>
Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments,... Read More >>
It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of... Read More >>
In this book the authors first describe the background of trusted platforms and trusted computing and speculate... Read More >>
The need for information privacy and security continues to grow and gets increasingly recognized. In this regard,... Read More >>
Smart online security is critical. But guidance for staying safe has been fragmented and confusing-until now. Hack-Proof... Read More >>
Presents the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary... Read More >>
By promoting dissemination and sharing of knowledge, cyber-democracy allows a knowledge conversion of the local... Read More >>