Free Delivery Over $100
6378 books were found.
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on... Read More >>
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference... Read More >>
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference... Read More >>
This book constitutes the refereed proceedings of the Second International Workshop on Recommender Systems for Sustainability... Read More >>
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an... Read More >>
Read More >>
Everyone needs security: Nations need national security, corporations need corporate security, individuals need... Read More >>
In the “Handbook of Biometric Template Protection,” we delve into the rapidly evolving world of Biometric Template... Read More >>
This book is for anyone who cares about their privacy and data protection rights. It examines transatlantic conflicts... Read More >>
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, ""a hugely important... Read More >>
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security.... Read More >>
A practical guide to modern cybersecurity using Microsoft tools, covering step-by-step setup, Zero Trust AI integration,... Read More >>
ISO/IEC 42001:2023 is the world-first standard for managing AI responsibly. It addresses the unique challenges AI... Read More >>
Advancements in computational intelligence, which encompasses artificial intelligence, machine learning, and data... Read More >>
Der Sammelband zum Rechtsrahmen der Cybersicherheit und Privatheit bietet eine umfassende Sammlung von Beiträgen... Read More >>
Erfahren Sie, wie Sie Ihren eigenen VPN-Server in der Cloud oder auf einem Raspberry Pi erstellen Dieses Buch ist... Read More >>
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures. Read More >>
WSN and IoT: An Integrated Approach for Smart Applications discusses the integration of IoT and WSN which enables... Read More >>
If you think intelligence work is all trench coats, secret meetings, and dramatically whispering the word classified,... Read More >>
n 2024, American families lost over $16 billion to cybercrime-a 33% increase from the previous year. Children are... Read More >>
Develop the SOC analysis, triage, and investigation skills needed to succeed as a SOC analyst with the help of... Read More >>
AI-powered scams are no longer rare, clumsy, or easy to spot. They are fast, personal, and designed to exploit urgency,... Read More >>