Free Delivery Over $100
10062 books were found.
Learn how to build your own VPN server in the cloud or on a Raspberry Pi This book is a comprehensive guide to... Read More >>
The ability to make both individuals and consumers more secure online and on computer networks is a crying need... Read More >>
This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS... Read More >>
Cloak-and-dagger, high tech, and big business converge in this revelatory, page-turning account of a new kind of... Read More >>
The book is a collection of best selected research papers presented at the International Conference on Advances... Read More >>
Discover how different QRadar components fit together and explore its features and implementations based on your... Read More >>
Machine learning (ML) models, especially large pretrained deep learning (DL) models, are of high economic value... Read More >>
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference... Read More >>
了解如何在雲端或 Raspberry Pi 上搭建自己的 VPN 伺服器 本書是搭建你自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器的分步指南(繁體版)。基於 10 年和擁有數百萬用戶的開源工作,本書將幫助你在幾分鐘內搭建自己的... Read More >>
This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). The... Read More >>
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing... Read More >>
Many organizations today are required to have a formal IT Security Program in place in order to do business with... Read More >>
Read More >>
"""Biometric Framework Security using Finger Knuckle"" is a comprehensive and cutting-edge guide that explores the... Read More >>
"""Scalable Framework for Cyber Threat Situational Awareness"" is a comprehensive and practical guide that explores... Read More >>
This book is a compilation of selected papers from the Seventh Symposium on Digital Instrumentation and Control... Read More >>
Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new... Read More >>
The book presents selected papers from the 18th International Conference on Intelligent Information Hiding and Multimedia... Read More >>
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The... Read More >>
This book gathers key advances in various areas related to using wireless Internet and wireless connectivity to... Read More >>