Free Delivery Over $100
9669 books were found.
Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key... Read More >>
Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch Purchase... Read More >>
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information... Read More >>
This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges... Read More >>
This book provides detailed and practical information for practitioners to understand why they should choose certification.... Read More >>
This book gathers selected high-quality research papers presented at the Second International Conference on Intelligent... Read More >>
This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of... Read More >>
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security... Read More >>
Im Zentrum steht der IT-Leistungserbringer, der auf Basis der vier strategischen IT-Perspektiven Geschäftsprozessorientierung,... Read More >>
This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber... Read More >>
This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer... Read More >>
Read More >>
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards,... Read More >>
This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis... Read More >>
"""Cyber Security Governance & Risk Management is the monitoring of compliance with agreed cyber security policies... Read More >>
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International... Read More >>
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined... Read More >>
Blockchain technology has garnered much attention in recent years from both academic and business spheres. At its... Read More >>
Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging... Read More >>
This book introduces some fundamentals of information and communication technology (ICT) and other current and future... Read More >>