Free Delivery Over $100
10027 books were found.
This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the... Read More >>
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless... Read More >>
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using... Read More >>
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from... Read More >>
ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the... Read More >>
Pluggable Authentication Modules: Threat or Menace?Many sysadmins live with authentication problems rather than... Read More >>
This 6 x 9 easy to hide password log and computer information is a great journal for your personal use. Awesome... Read More >>
The purpose of the Burp Suite Cookbook is to provide web application penetration testers with hands-on examples... Read More >>
The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions.This volume... Read More >>
********** NEW REVISED EDITION ! Stay safe with Covid-19, However STAY SAFE ONLINE AS WELL ! Do you feel... Read More >>
This volume constitutes the refereed post-conference proceedings of the First IFIP TC 5 DCDRR International Conference... Read More >>
This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security... Read More >>
The papers present current research in the area of computer speech processing, including recognition, synthesis,... Read More >>
Handy, convenient and useful password book journal to store all your websites, usernames, passwords, and other useful... Read More >>
Read More >>
Now you can log into your favorite social media sites and shop at your favorite on any plateform or market place,... Read More >>
This book, written for practitioners in the field, provides tangible, cost effective, and thus pragmatic means to... Read More >>
The book systematically presents the essential aspects and applicable procedures for planning secure information... Read More >>
Wanna see if we have the age you are looking for on any of our birthday books? Just search the words black river... Read More >>
Your birthday, MonkEy11223344, 12341234, Pa$$word, 11223344 won't be your passwords anymore. How many times you... Read More >>
Der Autor ist Softwareentwickler und Dozent und hat dieses Buch für Nutzer geschrieben, die mehr Kontrolle über... Read More >>