Free Delivery Over $100
10062 books were found.
Discover how to fortify the weakest link in your cybersecurity chain with the help of an industry cyber expert.... Read More >>
"In ""Hack the Airwaves,"" Josh, a seasoned cybersecurity expert, delves deep into the intricate world of Bluetooth... Read More >>
This book offers the latest research results in recent development on the principles, techniques and applications... Read More >>
This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of... Read More >>
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that... Read More >>
Read More >>
"Explore the important intersection of climate change research and cybersecurity with our enlightening Special Report,... Read More >>
This volume contains the papers accepted for presentation at Africacrypt 2023, the 14th International Conference... Read More >>
This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023,... Read More >>
Researchers and students studying/working in data protection and related security fields will find this book useful... Read More >>
This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
Mastering Bug Bounty: A Comprehensive Handbook for Ethical Hackers, authored by Aaron Rodriguez, is an essential... Read More >>
The book is a collection of high-quality research papers presented at International Conference on Next Generation... Read More >>
Secure your digital frontiers with this Special Report on Dealing with Multi-Factor Authentication (MFA) Issues.... Read More >>
"In an era defined by invigorating technology advances, ""Navigating the Maze of AWS WAF and Shield False Positives"",... Read More >>
"Enter the vast and unchartered frontier of the wireless data landscape with Edmund Francis as your guide - through... Read More >>
Network scanning is a crucial process in managing and securing computer networks. It involves identifying hosts,... Read More >>
"Discover the secrets behind the triumph of modern supply chain management in this comprehensive book on ""Global... Read More >>
Crypto is going to change the world, and for those tired of confusing financial jargon and complicated technical... Read More >>
This book provides numerous examples of different attacks and also includes some exercises that you can follow when... Read More >>
"""Automated Security Testing: Tools and Techniques for Protecting Web Applications"" is your comprehensive guide... Read More >>
In this engaging and comprehensive Special Report: Edge Computing and IoT: Scalable Programming Solutions, you'll... Read More >>
This book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors... Read More >>