Free Delivery Over $100
9981 books were found.
���� Grab your copy today and elevate your System Design journey! ���� Read More >>
Key Features: Learn Python for cybersecurity in simple steps Practical projects for hands-on experience Explore... Read More >>
Read More >>
The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference... Read More >>
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which... Read More >>
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital... Read More >>
"The book ""Blockchain and AI in Cyber Physical System (CPS)"" explores the intersection of blockchain technology,... Read More >>
The book is a collection of best selected research papers presented at International Conference on Network Security... Read More >>
The papers of this volume are organized in topical sections on wired and wireless communication systems, high dimensional... Read More >>
This book includes original unpublished contributions presented at the International Conference on Data Analytics... Read More >>
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference... Read More >>
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important... Read More >>
This book provides an essential compilation of relevant and cutting edge academic and industry work on key Blockchain... Read More >>
"Introducing the ""Cloud Security & Forensics Handbook: Dive Deep into Azure, AWS, and GCP"" Book Bundle! ����... Read More >>
"Unlock the Power of Blue Team Defense! ���� Introducing ""Blue Team Operations: Defense"" - Your Comprehensive... Read More >>
The corresponding algorithms for significantly improving the security of UAV networks, along with practical case... Read More >>
Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities... Read More >>