Free Delivery Over $100
10062 books were found.
The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication,... Read More >>
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation... Read More >>
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International... Read More >>
In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics... Read More >>
Explore the latest developments in cybersecurity with this essential guide Every day it seems we read another... Read More >>
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical... Read More >>
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to... Read More >>
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International... Read More >>
Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification... Read More >>
Kickstart a career in cyber security by learning how to adapt your existing technical and non-technical skills with... Read More >>
This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights... Read More >>
It first introduces architecture approaches for IoT and IoT security, describing the security techniques for different... Read More >>
The Cyber Security Consultants Playbook is your guide to streamlining your Cybersecurity career by leveraging the... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Digital Forensics and Cyber... Read More >>
This book constitutes the refereed proceedings of the 15th IFIP WG 11.8 World Conference on Information Security... Read More >>
Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect... Read More >>
This book explores the combination of Reinforcement Learning and Quantum Computing in the light of complex attacker-defender... Read More >>
This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography... Read More >>
Presents the emerging technologies and applications of computational intelligence for the law enforcement of the... Read More >>
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security Without... Read More >>
A complete market research guide to the cybersecurity, digital ID and online fraud industry—for strategic planning,... Read More >>
Read More >>
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES... Read More >>