Free Delivery Over $100
6335 books were found.
The story of how the FBI secretly used an encrypted phone company to infiltrate one of the world's largest crime... Read More >>
The shocking untold story of the elite secret society of hackers fighting to protect our freedom, ""a hugely important... Read More >>
Read More >>
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security.... Read More >>
The book presents a comprehensive overview of emerging IoT technologies, IoT devices and sensors and their role... Read More >>
Mastering Cybersecurity – A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world... Read More >>
This book examines the complex interplay between state-of-the-art telecommunications, smart city initiatives, and... Read More >>
Erfahren Sie, wie Sie Ihren eigenen VPN-Server in der Cloud oder auf einem Raspberry Pi erstellen Dieses Buch ist... Read More >>
Generative AI for Cybersecurity and Privacy offers a groundbreaking exploration of how generative artificial intelligence... Read More >>
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications... Read More >>
101 Ways to Protect Yourself Online is a clear, practical, and easy-to-understand guide designed to help everyday... Read More >>
Staff design is a combination of team leadership and in-the-pixels design work, all without managing direct reports.... Read More >>
Security planning includes information security, network and physical security, incident response and metrics, to... Read More >>
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference... Read More >>
The AHS Internet Password Logbook is an attractive yet practical way to store device logins and internet passwords... Read More >>
This book offers a hands-on guide to cloud security from both offensive and defensive perspectives. It explores... Read More >>
Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures,... Read More >>
Learn how to build your own VPN server in the cloud or on a Raspberry Pi This book is a step-by-step guide to building... Read More >>
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an... Read More >>
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference... Read More >>