Free Delivery Over $100
35187 books were found.
NIS2 Compliance Guide: A Practical Implementation Framework Navigating the EU Network and Information Security... Read More >>
Un quadro di routing interdominio abilitato dalla blockchain per affrontare le vulnerabilità del Border Gateway... Read More >>
Uma estrutura de roteamento inter-domínio habilitada para blockchain para resolver vulnerabilidades no Border Gateway... Read More >>
A Blockchain-Enabled Inter-Domain Routing framework to address vulnerabilities in the Border Gateway Protocol (BGP),... Read More >>
Un cadre de routage interdomaine basé sur la blockchain pour remédier aux vulnérabilités du protocole BGP (Border... Read More >>
Ein Blockchain-fähiges Inter-Domain-Routing-Framework zur Behebung von Schwachstellen im Border Gateway Protocol... Read More >>
mso-ansi-language: EN-US;"">Discover the psychological tricks and techniques used by human hackers to exploit your... Read More >>
The book focuses on the fundamental principles of IBN technology operation and integration for managing 5G and beyond.... Read More >>
This book provides comprehensive insight into the end-to-end automation journey of telecommunications. It explores... Read More >>
This book on Governance, Risk Management Compliance (GRC) and Data Privacy is designed to equip apprentices, students... Read More >>
Privacy is fundamental to ensure human dignity and autonomy. It may be surprising for some of the Data Privacy experts... Read More >>
KALI LINUX RED TEAM 2025 Beherrsche offensive Strategien mit Hochleistungswerkzeugen Dieses Buch richtet sich an... Read More >>
Network Security from Scratch helps you build a strong foundation in protecting digital systems and communications.... Read More >>
Mastering Ubuntu Linux is a complete, practical guide for users, administrators, and developers who want full control... Read More >>
Hacking verständlich erklärt - Der praktische Einstieg in Ethical Hacking & Cybersecurity Tauchen Sie ein in die... Read More >>
A hands-on technical and industry roadmap for aspiring data engineers In Data Engineering for Beginners, big data... Read More >>
This book provides a holistic overview of current state of the art and practice in malware research as well as the... Read More >>
Business executives consider what is necessary to protect the company. It comes down to people, process and technology,... Read More >>
Bringing together leading specialists from many fields on information resilience, this book examines how to ensure... Read More >>
The internet has a dark side-are you prepared to face it? In The Dark Web and Scams: A Guide for Personal Cybersecurity,... Read More >>
Questo lavoro presenta un approccio innovativo alla protezione ineguale per la trasmissione video su canali rumorosi,... Read More >>
Build intelligent automations with AI, RPA, and Microsoft 365 to streamline work and reduce manual tasks Free with... Read More >>
The AHS Internet Password Logbook is an attractive yet practical way to store device logins and internet passwords... Read More >>