Free Delivery Over $100
5984 books were found.
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the... Read More >>
Faced with relentless technological aggression in the twenty-first century, how can Western nations fight back to... Read More >>
Read More >>
An urgent expose into how our modern digital lives place our privacy under threat - giving us a new understanding... Read More >>
The key to preventing online child predation is Stakeholder Involvement. Parents and guardians need to place themselves... Read More >>
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our... Read More >>
This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics,... Read More >>
When I finished my book Cyber Security Instinct in 2017, I thought it was the best way to pass on my experience... Read More >>
Sensibilisation des employés à la cybersécurité, sans la science des fusées Si vous pensez que le dernier logiciel... Read More >>
Searching for a needle in a haystack is an important task in several contexts of data analysis and decision-making.... Read More >>
This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging... Read More >>
Learn how to master the most lucrative internet business possibilities and attain financial independence! Even... Read More >>
Keep Reading If You Want To Make Good Money Online Without Wasting A Lot Of Time And Money... You are about... Read More >>
Do you ever wonder just how safe you are online? Do you worry that someone will steal your data? Your passwords?... Read More >>
Written by library privacy experts and based on input and guidance from a wide cross-section of stakeholders, this... Read More >>
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet... Read More >>
This book focuses on security issues in the IoT environment. It analyzes the security problems of each layer separately... Read More >>
The book begins by identifying the technological features from which security issues arise. It describes how the... Read More >>
Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for... Read More >>
Do you feel that informatics is indispensable in today's increasingly digital world? Do you want to introduce yourself... Read More >>