Computer networking & communications books

35054 books were found.

Cybersecurity: Cyber Defense, Privacy and Cyber Warfare

Cybersecurity: Cyber Defense, Privacy and Cyber Warfare...

Author: George Dimitoglou ,  Leonidas Deligiannidis
ISBN: 9783111436418
Format: Hardback
$107.22

The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security....  Read More >>

DeFi Investigation Guide: Complete Handbook for Decentralized Finance Intelligence & Cryptocurrency Forensics

DeFi Investigation Guide: Complete Handbook for Decentralized...

Author: Kyranov Belvek
ISBN: 9798277083987
Format: Paperback
$92.37

Welcome to the wild west of finance - where your money rides on smart contracts, villains hide behind pseudonyms,...  Read More >>

Living off the Land: A Comprehensive Guide to Understanding, Detecting, and Mitigating Living-Off-The-Land Attacks in Cybersecurity

Living off the Land: A Comprehensive Guide to Understanding,...

Author: Raúl Renales Agüero
ISBN: 9798277058169
Format: Paperback
$52.80

Living Off The Land Attacks: The Silent War Inside Your Systems is a deep and comprehensive exploration of one of...  Read More >>

Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II

Theory of Cryptography: 23rd International Conference,...

Author: Benny Applebaum ,  Huijia (Rachel) Lin
ISBN: 9783032122926
Format: Paperback
$211.17

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on...  Read More >>

Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part I

Theory of Cryptography: 23rd International Conference,...

Author: Benny Applebaum ,  Huijia (Rachel) Lin
ISBN: 9783032122865
Format: Paperback
$211.17

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on...  Read More >>

Security and Privacy: 4th International Conference, ICSP 2025, Rourkela, India, December 5–7, 2025, Proceedings

Security and Privacy: 4th International Conference,...

Author: Sihem Mesnager ,  Pantelimon Stănică
ISBN: 9783032128331
Format: Paperback
$211.17

This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP...  Read More >>

Advancing Innovative Cybersecurity Solutions and Approaches to Protect Digital Ecosystems: First IFIP TC 9, TC 11 International Conference in Cybersecurity, IFIP-UNIVEN-CSIR ICC 2025, Tshwane, South Africa, December 11–12, 2025, Proceedings

Advancing Innovative Cybersecurity Solutions and Approaches...

Author: Jabu Mtsweni ,  Modimowabarwa Kanyane
ISBN: 9783032130747
Format: Hardback
$343.17

This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR...  Read More >>

Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities

Securing a Healthcare Facility: A Guide to Implementing...

Author: Derek Sliger
ISBN: 9781041103905
Format: Paperback
$77.99

The need for this book arises from the growing cybersecurity challenges faced by small to medium-sized healthcare...  Read More >>

Ulepszony schemat nadawania probabilistycznego dla routingu w sieciach MANET

Ulepszony schemat nadawania probabilistycznego dla routingu...

Author: Abdalla Musbah Omar Hanashi
ISBN: 9786209335259
Format: Paperback
$219.12

Nadawanie jest podstawową techniką propagacji danych, która ma wiele zastosowań, takich jak wykrywanie tras i rozpoznawanie...  Read More >>

Verbessertes probabilistisches Rundfunkverfahren für das Routing in MANETs

Verbessertes probabilistisches Rundfunkverfahren für...

Author: Abdalla Musbah Omar Hanashi
ISBN: 9786209337819
Format: Paperback
$219.12

Rundfunk ist eine grundlegende Technik zur Datenübertragung, die eine Reihe von Anwendungen wie Routenfindung und...  Read More >>

Bash for Hackers: Creative Shell Scripting for Pentesters & Red-Team Operators

Bash for Hackers: Creative Shell Scripting for Pentesters...

Author: Charles Sprinter
ISBN: 9798276876573
Format: Paperback
$76.56

Bash for Hackers is the definitive, hands-on guide to weaponizing the Bash shell for real-world offensive security...  Read More >>

The Unseen Empire: MI6 and the Secret Shape of Global Power

The Unseen Empire: MI6 and the Secret Shape of Global...

Author: Dr Naeem Chishti
ISBN: 9798276984063
Format: Paperback
$52.77

intelligence service mediate between foreign policy objectives, national security imperatives, and the moral complexities...  Read More >>

Arch Linux Mastery: A Complete Guide to Installation, System Customization, and Maintaining a Rolling Release System

Arch Linux Mastery: A Complete Guide to Installation,...

Author: Fred Klima
ISBN: 9798276917245
Format: Paperback
$71.28

Arch Linux Mastery: A Complete Guide to Installation, System Customization, and Maintaining a Rolling Release System...  Read More >>

Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities

Securing a Healthcare Facility: A Guide to Implementing...

Author: Derek Sliger
ISBN: 9781041103929
Format: Hardback
$77.99

The need for this book arises from the growing cybersecurity challenges faced by small to medium-sized healthcare...  Read More >>

Quantum Technologies: Trends and Implications for Cyber Defense

Quantum Technologies: Trends and Implications for Cyber...

Author: Julian Jang-Jaccard ,  Philippe Caroff
ISBN: 9783031907265
Format: Hardback
$116.41

This open access book invites readers to explore the emerging opportunities and strategic significance of quantum...  Read More >>

Mastering Modern Security: A Smarter Approach to Resilient Building Security Systems and Staying Ahead of Threats

Mastering Modern Security: A Smarter Approach to Resilient...

Author: Rob Jackson
ISBN: 9781966372004
Format: Hardback
$66.00

""Modern threats require modern security."" Mastering Modern Security reveals how to transform your security system...  Read More >>

Zero Trust Security: A Hands-on Guide

Zero Trust Security: A Hands-on Guide

Author: Adam Tilmar Jakobsen (National Cybercrime Centre (NC3), Denmark)
ISBN: 9781394361090
Format: Hardback
$163.95

Principles, applications, and methodologies to help organizations transition from traditional security models to...  Read More >>

Threat Modeling Best Practices: Proven frameworks and practical techniques to secure modern systems

Threat Modeling Best Practices: Proven frameworks and...

Author: Derek Fisher
ISBN: 9781805128250
Format: Paperback
$118.77

Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures,...  Read More >>

Protocolli intelligenti di routing per reti mobili ad hoc

Protocolli intelligenti di routing per reti mobili ad...

Author: Elmustafa Sayed Ali Ahmed Mohamed
ISBN: 9786209337703
Format: Paperback
$121.44

I protocolli di routing intelligenti sono diventati uno schema importante per migliorare le prestazioni del routing...  Read More >>

Protocolos inteligentes de encaminhamento de rede móvel ad hoc

Protocolos inteligentes de encaminhamento de rede móvel...

Author: Elmustafa Sayed Ali Ahmed Mohamed
ISBN: 9786209332586
Format: Paperback
$121.44

Os protocolos de encaminhamento inteligente tornaram-se um esquema importante para melhorar o desempenho do encaminhamento...  Read More >>

Inteligentne protokoly routingu w mobilnych sieciach ad hoc

Inteligentne protokoly routingu w mobilnych sieciach...

Author: Elmustafa Sayed Ali Ahmed Mohamed
ISBN: 9786209335143
Format: Paperback
$121.44

Inteligentne protokoly routingu staly się ważnym schematem slużącym do poprawy wydajności routingu w mobilnych sieciach...  Read More >>

Protocoles intelligents de routage pour réseaux mobiles ad hoc

Protocoles intelligents de routage pour réseaux mobiles...

Author: Elmustafa Sayed Ali Ahmed Mohamed
ISBN: 9786209342820
Format: Paperback
$121.44

Les protocoles de routage intelligents sont devenus un dispositif important pour améliorer les performances du routage...  Read More >>

Practical C/C++ Security Engineering: Exploit Development, Hardening, and High-Performance Tools

Practical C/C++ Security Engineering: Exploit Development,...

Author: John M Wade
ISBN: 9798276771274
Format: Paperback
$79.17

C and C++ are the indispensable backbone of high-performance and systems programming, powering everything from operating...  Read More >>

Encryption at the Crossroads: Privacy, Power, and the Battle for a Secure Digital World

Encryption at the Crossroads: Privacy, Power, and the...

Author: Frank Westfield
ISBN: 9798276820637
Format: Paperback
$47.49

Encryption at the Crossroads: Privacy, Power, and the Battle for a Secure Digital WorldIn an age where every click,...  Read More >>

Dragon's Shadow: The Secret World of China's MSS

Dragon's Shadow: The Secret World of China's MSS

Author: Dr Naeem Chishti
ISBN: 9798276777887
Format: Paperback
$52.77

Dragon's Shadow: The Secret World of China's MSS is an unprecedented investigation into one of the world's most...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List