Free Delivery Over $100
19822 books were found.
Cybersecurity Standards and Frameworks: A Comprehensive Guide to Resilient Cyber Defense In today's digital landscape,... Read More >>
"""End-to-End Encryption in Mobile and Web Applications"" is an essential guide for anyone looking to deepen their... Read More >>
Join us on a journey of exploration, education, and empowerment as we unravel the intricacies of cybersecurity and... Read More >>
"In today's world, securing Operational Technology (OT) systems is critical for safeguarding critical infrastructure.... Read More >>
En la era digital, la gesti�n de identidades y accesos (IAM) se ha convertido en una columna vertebral esencial... Read More >>
"Unlock the world of ethical hacking with ""Ethical Hacking: Understanding the basics of Hacking Tools and Techniques... Read More >>
"Este livro � um guia abrangente que desmistifica os complexos conceitos da seguran�a de aplica��es de forma acess�vel... Read More >>
The future belongs to the cyber-resilient. Whether you're an individual navigating the online landscape or a business... Read More >>
The goal of this book is to foster transformative, multidisciplinary, and novel approaches that ensure the CPSs... Read More >>
public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities;... Read More >>
Intermediate user level Read More >>
This book offers a critical analysis of cybersecurity from a legal-international point of view. It evaluates the... Read More >>
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2024, CT-RSA 2024,... Read More >>
The book reviews the development process of blockchain algorithms and examples of their applications in different... Read More >>
Read More >>
The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age.... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Blockchain Technology and... Read More >>
This 4-volume CCIS post-conference set represents the proceedings of the Second International Conference on Advances... Read More >>
"Hacking, espionage, war and cybercrime as you've never read about them before Fancy Bear was hungry. Looking for... Read More >>
Seine gesamte Breite wird sachlich vorgestellt und begründet, jedoch so, dass in vielen Fällen noch Schmunzeln über... Read More >>
"""In this hands-on guidebook, Windows security expert and bug hunter Forshaw distills his knowledge and describes... Read More >>