Free Delivery Over $100
19857 books were found.
Read More >>
This book constitutes the refereed proceedings of the 26th International Conference on Information Security and... Read More >>
Addressing the physical layer security challenges and proposing efficient and resilient physical layer security... Read More >>
"Embark on a transformative journey through the digital landscape with ""Social Sector - Check What Awaits You,""... Read More >>
"Are you ready to take your cloud computing skills to the next level? Look no further than the comprehensive resource... Read More >>
A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent... Read More >>
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains... Read More >>
"Welcome to the world of cybersecurity and ethical hacking, where the digital landscape is both your playground... Read More >>
In this freshly updated edition, Barak Engel adds new sections that correspond with the chapters of the original... Read More >>
At the beginning of this Book, you will get a breakdown of the world of ethical hacking. If you ever wondered what... Read More >>
"""Cybersecurity for Everyone"" is a user-friendly guide that provides practical tips and tools to protect yourself... Read More >>
"In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams... Read More >>
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important... Read More >>
This book is devoted to the study of artificial intelligence from a new perspective – not just a technology but... Read More >>
Distributed ledger technology, the backbone of cryptocurrencies like Bitcoin, extends far beyond the realm of digital... Read More >>
This book embodies the curriculum taught by Bruno Ciroussel at the 'Institute for the Fight against Economic Crime'... Read More >>
A comprehensive analysis of China's cyberspace threats and policies, emphasizing the vantage points of China and... Read More >>
In order to perform effective analysis of today’s information security systems, numerous components must be taken... Read More >>