Free Delivery Over $100
9653 books were found.
"Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no... Read More >>
Read More >>
"""A Guide on iPhone Security"" ist ein unverzichtbarer Leitfaden, der sich durch das Labyrinth der iPhone-Sicherheit... Read More >>
This guide introduces you to the key elements of the Europrivacy(TM)/(R). Read More >>
Distributional shift can significantly degrade the performance of artificial intelligence systems and limit their... Read More >>
Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource... Read More >>
As cloud services become increasingly popular, safeguarding sensitive data has become paramount. Privacy Preservation... Read More >>
"The book will help you develop a ""build security in"" mindset, exploring techniques for the complete SDLC." Read More >>
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during... Read More >>
Grokking Web Application Security teaches you how to build web apps that are ready for and resilient to any attack.... Read More >>
"Embark on a transformative journey through the digital landscape with ""Social Sector - Check What Awaits You,""... Read More >>
"Are you ready to take your cloud computing skills to the next level? Look no further than the comprehensive resource... Read More >>
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains... Read More >>
Gain cybersecurity confidence - unlock the secrets to a foolproof defense system for your digital assets Picture... Read More >>
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against... Read More >>
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management... Read More >>
This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing... Read More >>
Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle... Read More >>
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography... Read More >>
The Internet revolution has changed everything. As per the data, the United State household now has 5.7 Internet-connected... Read More >>