Free Delivery Over $100
10074 books were found.
Read More >>
Protect your written information and passwords using a special encryption method included in this password logbook.... Read More >>
Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum... Read More >>
This book features a collection of high-quality research papers presented at the International Conference on Intelligent... Read More >>
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure... Read More >>
Simply put, this book was written for You. You're busy. This guidebook is written clearly and concisely to get to... Read More >>
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully revised and updated... Read More >>
This book discusses recent advances in computer and computational sciences from upcoming researchers and leading... Read More >>
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security... Read More >>
This Password Keeper Log is a perfect way to quickly and easily store your important passwords so you don't have... Read More >>
This book constitutes the refereed proceedings of the 13th IFIP WG 11.11 International Conference on Trust Management,... Read More >>
With IPhone 12 Pro Max, You Have All The Features And Top-End Specs You Desire In A Smartphone. The Apple iPhone... Read More >>
Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social... Read More >>
Includes one year of FREE access after activation to the online test bank and study tools: Custom practice... Read More >>
If You Are Very Much Worried About The Security Structure Of Your Network Or Server And Want To Prevent All Forms... Read More >>
It takes more than one source of study material to prepare for the Security+ exam, but who has time to read through... Read More >>
This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security... Read More >>
This Screen Time Log is a perfect way of recording your child's screen time. Keep track of their screentime, take... Read More >>
The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC... Read More >>
By the time you come to the end of this book, you will have mastered the basics of computer hacking alongside many... Read More >>