Free Delivery Over $100
10062 books were found.
Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility... Read More >>
With the transition to the information age, a large amount of personal data has begun to be collected through technology.... Read More >>
This book covers selected high-quality research papers presented in the International Conference on Cyber Security,... Read More >>
Network security paradigm should be the one that permeates the enterprise, including people, processes and technology.... Read More >>
Automate Network Infrastructure, Optimize Network Performance, and Analyze Packets with Rust Ecosystem Rust for... Read More >>
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and... Read More >>
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with... Read More >>
This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This ... Read More >>
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie,... Read More >>
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks.... Read More >>
This book constitutes selected papers presented at the First International Conference on Advanced Communication... Read More >>
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the... Read More >>
This book presents trading in local energy markets and communities. Read More >>
To help improve leadership decisionmaking related to the costs of offensive cyber operations acquisition, the authors... Read More >>
Read More >>
This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn... Read More >>
This book covers power systems cybersecurity. In order to enhance overall stability and security in wide-area cyber-physical... Read More >>
How we lost control of the internet—and how to win it back. The internet has become a battleground. Although it... Read More >>
This book aims at updating the relevant computer science-related research communities, including professors, researchers,... Read More >>
This was developed by the authors to provide an overall broader perspective and grounded approach to solve access... Read More >>
They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain,... Read More >>
This book constitutes the revised selected papers from the 23rd International Conference on Information Security... Read More >>
Are you interested in finding new and effective ways to keep your system safe and secure? Do you want to make sure... Read More >>
Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation... Read More >>
Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it... Read More >>