Free Delivery Over $100
10346 books were found.
Read More >>
The inside story of the largest digital piracy sting to date. Read More >>
This hearing will examine China's use of standards, regulation, and censorship as a market-entry barrier. It will... Read More >>
Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen... Read More >>
Most Americans have been alarmed by the recent data breaches at Target, Neiman Marcus, and Michaels stores. The... Read More >>
The selected contributions covered cutting-edge aspects of Cloud Computing and Internet of Things, sensor networks,... Read More >>
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications,... Read More >>
A one-of-a-kind guide to setting up a state-of-the-art malware research lab, using and customizing dozens of cutting-edge... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing,... Read More >>
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation... Read More >>
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International... Read More >>
Your sovereignty is under attack! It's plain as day, all around you. Everywhere.Within this book lies top secrets... Read More >>
This publication, Army Techniques Publication ATP 6-02.75 Techniques for Communications Security (COMSEC) Operations... Read More >>
This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security... Read More >>
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on... Read More >>
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting... Read More >>
Lo que aprendera en este libro: 1) Como los medios sociales pueden perjudicar el futuro de su hijo 2) Errores... Read More >>
Table of Contents Introduction So How Does a Spammer Benefit by Sending You Spam Viruses and Malware Recognizing... Read More >>
Exploring the elements of a national strategy for U.S. foreign policy, the book examines critical global, regional,... Read More >>