Free Delivery Over $100
10027 books were found.
Read More >>
"Mit seinem Workshop 2018 zum Thema ""Echtzeit und Sicherheit"" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme... Read More >>
Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action... Read More >>
Disaster Recovery Planning, Fourth Edition offers today's most comprehensive, holistic, up-to-date, and practical... Read More >>
security investments, and cyber insurance for dependable and secure systems; security and privacy of wireless and... Read More >>
They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing... Read More >>
This book is a fully focused, structured book providing guidance on developing practical penetration testing skills... Read More >>
Information Technology products and services face insidious threats from advanced malware that, if left unchecked,... Read More >>
Wanna see if we have the age you are looking for on any of our birthday books? Just search the words black river... Read More >>
CEH v10 covers new modules for the security of IoT devices, vulnerability analysis, focus on emerging attack vectors... Read More >>
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented... Read More >>
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare... Read More >>
die Beteiligung der Bürgerinnen und Bürger an politischen Planungsprozessen oder Entscheidungen, wird bereits in... Read More >>
The book features research papers presented at the International Conference on Computer Networks and Inventive Communication... Read More >>
This book and DVD set provides a practical hands-on approach to solving problems encountered when performing computer-related... Read More >>
Forget Me not: password book with Alphabetized pages Store all your websites, keep all your password information... Read More >>
Pluggable Authentication Modules: Threat or Menace?Many sysadmins live with authentication problems rather than... Read More >>
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives... Read More >>
This book contains selected papers from the 7th International Conference on Information Science and Applications... Read More >>
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing... Read More >>
It presents an integrated five-part framework for location privacy research, which includes the analysis of location... Read More >>