Free Delivery Over $100
10062 books were found.
Read More >>
This book will help you to design, develop, and operate security controls on Google Cloud as well as discover best... Read More >>
This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of... Read More >>
This book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks... Read More >>
This open access book describes the most important legal sources and principles of data privacy and data protection... Read More >>
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd... Read More >>
"In ""OSINT Decoded: Demystifying the World of Open Source Intelligence,"" author Louis Colbert delves into the... Read More >>
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated... Read More >>
The book is a collection of peer-reviewed best selected research papers presented at the International Conference... Read More >>
This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information... Read More >>
A comprehensive guide for professionals who want to move from Zero Trust theory to implementation Today's organisations... Read More >>
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing,... Read More >>
Indeed, several verification tools have been proposed by the research community and any software application, in... Read More >>
"""Cyber Resilience: Navigating the Digital Age"" is an essential book for today's business leaders, providing a... Read More >>
The present book includes extended and revised versions of a set of selected papers presented at the 18th International... Read More >>
This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information... Read More >>
The book highlights how the legal landscape for data protection, cross-border data flows and cybersecurity law... Read More >>
This book features selected papers from the International Conference on Soft Computing for Security Applications... Read More >>