Free Delivery Over $100
10028 books were found.
GIFT IDEAS JOURNALS & ORGANIZERS ORGANIZATION Sorry, your password much contain an uppercase letter, a... Read More >>
The book covers current developments in the field of expert applications and security, which employ advances of... Read More >>
This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec... Read More >>
This collection of papers highlights the current state of the art of cybersecurity. Read More >>
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning... Read More >>
Read More >>
Tired of forgetting your login passwords on social media and other favorite websites? Those days are over with the... Read More >>
"If you want to avoid getting hacked, having your information spread and risking financial loss, then keep reading...... Read More >>
This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology... Read More >>
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference... Read More >>
In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management... Read More >>
The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum... Read More >>
This book constitutes the refereed proceedings on the 23rd Nordic Conference on Secure IT Systems, NordSec 2018,... Read More >>
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings,... Read More >>
This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations,... Read More >>
This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations,... Read More >>
This book introduces the EU's NIS Directive (Directive on security of network and information systems). It explains... Read More >>
Integrated Security Technologies and Solutions - Volume II is part of the Cisco CCIE Professional Development Series... Read More >>
Windows Group Policy has been one of the most powerful yet underutilized tools in our corporate networks for many... Read More >>
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology... Read More >>