Free Delivery Over $100
10027 books were found.
This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software... Read More >>
Read More >>
This is the perfect personalized journal to keep all your password information together and secure. This book has... Read More >>
The book provides insights into International Conference on Smart Innovations in Communications and Computational... Read More >>
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.... Read More >>
This book describes grouping detection and initiation; At the same time, it integrates cognition into the application.... Read More >>
This book constitutes the proceedings of the International Conference on Edge Computing, EDGE 2018, held in Seattle,... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust... Read More >>
A guide for school systems to help them understand why protecting student data privacy is a critical responsibility... Read More >>
This book presents current research in privacy-preserving protocols for smart grids. The author shows that this... Read More >>
This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International... Read More >>
The three-volume set LNCS 10860, 10861 and 10862 constitutes the proceedings of the 18th International Conference... Read More >>
This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and... Read More >>
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including... Read More >>