Free Delivery Over $100
10031 books were found.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including... Read More >>
Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect... Read More >>
Presents the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary... Read More >>
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental... Read More >>
It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using... Read More >>
A work from Cengage Learning on hands-on ethical hacking and network defense. Read More >>
What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in... Read More >>
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the... Read More >>
Smart online security is critical. But guidance for staying safe has been fragmented and confusing-until now. Hack-Proof... Read More >>
Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments,... Read More >>
In this book the authors first describe the background of trusted platforms and trusted computing and speculate... Read More >>
The need for information privacy and security continues to grow and gets increasingly recognized. In this regard,... Read More >>
This book is the 10th volume in the annual series produced by the International Federation for Information Processing... Read More >>
By promoting dissemination and sharing of knowledge, cyber-democracy allows a knowledge conversion of the local... Read More >>
Trusted Computing for Embedded Systems Read More >>
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management,... Read More >>