Free Delivery Over $100
19761 books were found.
The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International... Read More >>
EMCIS covers technical, organizational, business, and social issues in the application of information technology... Read More >>
An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time... Read More >>
The ideas of this book originates from the mobile WAVE approach which allowed us to implement citywide heterogeneous... Read More >>
This book provides a comprehensive platform for learning the state-of-the-art machine learning algorithms for solving... Read More >>
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined... Read More >>
Read More >>
This book at one stage was called The Internet Age, Being Safe and Secure on the Internet and is intended for active... Read More >>
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis... Read More >>
The book aims to present a multi-dimensional view on the blockchain-driven supply chain management and its linkage... Read More >>
AI vs. Identity Theft: Securing the Digital Age By Abebe-Bard AI Woldemariam (pen name) and Abebe Gebre Woldemariam... Read More >>
Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging... Read More >>
This book introduces some fundamentals of information and communication technology (ICT) and other current and future... Read More >>
This book comprises select peer-reviewed papers from the International Conference on IoT, Intelligent Computing... Read More >>
Die st�ndig wachsende Bedrohungslage in der digitalen Sicherheitslandschaft f�hrt dazu, dass stets neue Fachbezeichnungen... Read More >>
This book explains in simple terms what it means for a distributed machine learning scheme to be robust to these... Read More >>
Discover the strategies, secrets and stories behind the cyber attacks that target businesses and individuals across... Read More >>
This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC... Read More >>
public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities;... Read More >>