Computer security books

19724 books were found.

Collaborative Computing: Networking, Applications and Worksharing: 19th EAI International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part II

Collaborative Computing: Networking, Applications and...

Author: Honghao Gao ,  Xinheng Wang
ISBN: 9783031545276
Format: Paperback
$206.97

The three-volume set LNICST 561, 562  563 constitutes the refereed post-conference proceedings of the 19th EAI International...  Read More >>

Collaborative Computing: Networking, Applications and Worksharing: 19th EAI International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part III

Collaborative Computing: Networking, Applications and...

Author: Honghao Gao ,  Xinheng Wang
ISBN: 9783031545306
Format: Paperback
$194.04

The three-volume set LNICST 561, 562  563 constitutes the refereed post-conference proceedings of the 19th EAI International...  Read More >>

Collaborative Computing: Networking, Applications and Worksharing: 19th EAI International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part I

Collaborative Computing: Networking, Applications and...

Author: Honghao Gao ,  Xinheng Wang
ISBN: 9783031545207
Format: Paperback
$194.04

The three-volume set LNICST 561, 562  563 constitutes the refereed post-conference proceedings of the 19th EAI International...  Read More >>

The Invisible Hand Economic Intelligence And Industrial Espionage

The Invisible Hand Economic Intelligence And Industrial...

Author: Davis Truman
ISBN: 9798224187331
Format: Paperback
$34.29

"""The Invisible Hand"" delves deep into the clandestine world of economic intelligence and industrial espionage,...  Read More >>

Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity

Cybersecurity Risks and Controls: Fundamentals of Organizational...

Author: Messenger
ISBN: 9781738008889
Format: Hardback
$131.97

"In an era where digital threats loom large, this comprehensive book provides a holistic exploration of the fundamentals,...  Read More >>

Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication

Trojan Exposed: Cyber Defense And Security Protocols...

Author: Rob Botwright
ISBN: 9781839386596
Format: Paperback
$105.47

"Introducing the ""Trojan Exposed"" Book Bundle: Your Ultimate Defense Against Cyber Threats! ����️ Are you concerned...  Read More >>

The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age

The GPT-4 Crypto Revolution: Pioneering Profit in a...

Author: Zane Wilder
ISBN: 9798224332267
Format: Paperback
$44.85

 Read More >>

Desinformationsangriffe auf Unternehmen abwehren: Das dunkle Geschäft mit Fake News & Co und wie man sie bekämpft

Desinformationsangriffe auf Unternehmen abwehren: Das...

Author: Uwe Wolff
ISBN: 9783658437541
Format: Paperback
$171.57

Spätestens seit den massiven Desinformationsangriffen auf westliche Impfstoffhersteller während der Coronapandemie...  Read More >>

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance

Facial Recognition Technology: Current Capabilities,...

Author: National Academies of Sciences, Engineering, and Medicine ,  Division of Behavioral and Social Sciences and Education
ISBN: 9780309713207
Format: Paperback
$105.60

Facial recognition technology is increasingly used for identity verification and identification, from aiding law...  Read More >>

Decision Making and Security Risk Management for IoT Environments

Decision Making and Security Risk Management for IoT...

Author: Wadii Boulila ,  Jawad Ahmad
ISBN: 9783031475894
Format: Hardback
$422.37

This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making...  Read More >>

NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library

NMAP Network Scanning Series: Network Security, Monitoring,...

Author: Rob Botwright
ISBN: 9781839386534
Format: Paperback
$105.47

Unlock the Power of Network Security with the NMAP Network Scanning Series! Welcome to the Network Security, Monitoring,...  Read More >>

Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions

Bent Functions and Permutation Methods: Binary and Multiple-Valued...

Author: Radomir S. Stanković ,  Milena Stanković
ISBN: 9783031506499
Format: Hardback
$145.17

This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing...  Read More >>

Declutter your Mind, Home and Digital Spaces

Declutter your Mind, Home and Digital Spaces

Author: Andrew William James
ISBN: 9798224615865
Format: Paperback
$18.45

"Our lives are full of three types of things: Physical, non-physical, and emotional. Physical things are the...  Read More >>

Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark

Wireless Exploits And Countermeasures: Kali Linux Nethunter,...

Author: Rob Botwright
ISBN: 9781839386503
Format: Paperback
$105.47

"���� Wireless Exploits and Countermeasures Book Bundle ���� Unveil the Secrets of Wireless Security with Our Comprehensive...  Read More >>

Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation

Debugging Playbook: System Testing, Error Localization,...

Author: Rob Botwright
ISBN: 9781839386954
Format: Paperback
$93.40

 Read More >>

Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023

Cybersecurity Challenges in the Age of AI, Space Communications...

Author: Hamid Jahankhani
ISBN: 9783031475931
Format: Hardback
$336.35

This book provides an opportunity for researchers, scientists, government officials, strategist and operators and...  Read More >>

Navigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment

Navigating Cybersecurity: Defending Against Cyber Threats:...

Author: Olivia Larson
ISBN: 9798869124821
Format: Paperback
$52.77

"Our lives are now deeply intertwined with the digital world, and technology's power has given us access to unparalleled...  Read More >>

See Yourself in Cyber: Security Careers Beyond Hacking

See Yourself in Cyber: Security Careers Beyond Hacking...

Author: Ed Adams (Security Innovation)
ISBN: 9781394225590
Format: Hardback
$46.95

A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself...  Read More >>

Introduction to SBOM and VEX: Software Bill of Materials and Vulnerability Exploitability Exchange

Introduction to SBOM and VEX: Software Bill of Materials...

Author: Tom Alrich
ISBN: 9798876551733
Format: Paperback
$66.00

 Read More >>

Absolute Essentials of Ethereum

Absolute Essentials of Ethereum

Author: Paul Dylan-Ennis
ISBN: 9781032334189
Format: Hardback
$103.00

Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List