Free Delivery Over $100
35055 books were found.
Este livro é o resultado de uma pesquisa sobre um projeto alternativo de baixo custo para uma Rede de Área de Campus... Read More >>
Niniejsza książka jest wynikiem badań nad alternatywnym, niskokosztowym projektem sieci kampusowej (CAN), która... Read More >>
Sieci bezprzewodowych czujników są wykorzystywane w wielu różnych zastosowaniach, takich jak monitorowanie ataków... Read More >>
This book explores the transformative potential of Explainable AI (XAI) in enhancing healthcare delivery and XAI's... Read More >>
Microsoft Intune Admin Playbook is a practical, checklist-driven guide built for working endpoint administrators... Read More >>
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on... Read More >>
Read More >>
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security.... Read More >>
Welcome to the wild west of finance - where your money rides on smart contracts, villains hide behind pseudonyms,... Read More >>
Living Off The Land Attacks: The Silent War Inside Your Systems is a deep and comprehensive exploration of one of... Read More >>
This book constitutes the conference proceedings of the 4th International Conference on Security and Privacy, ICSP... Read More >>
This book constitutes the proceedings of the First IFIP TC 9, TC 11 International Cybersecurity Conference, IFIP-UNIVEN-CSIR... Read More >>
The need for this book arises from the growing cybersecurity challenges faced by small to medium-sized healthcare... Read More >>
Nadawanie jest podstawową techniką propagacji danych, która ma wiele zastosowań, takich jak wykrywanie tras i rozpoznawanie... Read More >>
Rundfunk ist eine grundlegende Technik zur Datenübertragung, die eine Reihe von Anwendungen wie Routenfindung und... Read More >>
Bash for Hackers is the definitive, hands-on guide to weaponizing the Bash shell for real-world offensive security... Read More >>
intelligence service mediate between foreign policy objectives, national security imperatives, and the moral complexities... Read More >>
Arch Linux Mastery: A Complete Guide to Installation, System Customization, and Maintaining a Rolling Release System... Read More >>
This open access book invites readers to explore the emerging opportunities and strategic significance of quantum... Read More >>
""Modern threats require modern security."" Mastering Modern Security reveals how to transform your security system... Read More >>
Principles, applications, and methodologies to help organizations transition from traditional security models to... Read More >>
Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures,... Read More >>