Free Delivery Over $100
10074 books were found.
Read More >>
Chapter “A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain”... Read More >>
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to... Read More >>
3 books in 1 Deal: -Book 1: How to Establish Effective Security Management Functions-Book 2: How to Apply the NIST... Read More >>
Bei der heutigen Datenflut, die auf Speichermedien und im Internet kursiert, ist die Kompression digitaler Daten... Read More >>
The book presents selected papers from the Fifteenth International Conference on Intelligent Information Hiding... Read More >>
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications... Read More >>
This book constitutes the refereed proceedings of the 11th IFIP WG 11.8 World Conference on Information Security... Read More >>
Conservative journalist Allum Bokhari examines how the liberal-leaning elites of Silicon Valley have completely... Read More >>
Is it possible to take advantage of the benefits of data collection--and mitigate risks--for both companies and... Read More >>
This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information... Read More >>