Free Delivery Over $100
33699 books were found.
Want to Remember the Passwords! This is the perfect book to keep all your password information together and secure.... Read More >>
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches... Read More >>
Password Book This Password Book is suitable for everyone who want easier organize: Website/Software, Login/Username,... Read More >>
This book provides a comprehensive introduction to the OMNeT++ simulation environment and an overview of its ecosystem... Read More >>
"Many """"smart"""" things or """"IoT"""" devices get connected every year, allowing the creation of new products... Read More >>
Explores various research techniques to profile the electronic hive mind around social topics as expressed on various... Read More >>
Provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity... Read More >>
Focuses on the foremost techniques of hidden link predictions in stochastic social networks, including methods and... Read More >>
Heterogeneous computing results in both challenges and opportunities. This book discusses both. It shows that we... Read More >>
The eleventh volume of a highly acclaimed series on critical infrastructure and homeland security, Information Technology... Read More >>
Read More >>
In these times when you have user names, passwords and hints for every app and website, we have a tendency to store... Read More >>
Presents research on the methods and applications of crowdsourcing in business operations and management, science,... Read More >>
The six volume set LNCS 11361-11366 constitutes the proceedings of the 14th Asian Conference on Computer Vision,... Read More >>
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and... Read More >>
The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique... Read More >>
Are you tired of losing track of login/usernames and passwords you must create every time you visit a new website?... Read More >>
Perhaps the best starting point for those looking to borrow a deterrent strategy for cyberspace from other fields... Read More >>
Many data-intensive applications that use machine learning or artificial intelligence techniques depend on humans... Read More >>