Free Delivery Over $100
9862 books were found.
This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing... Read More >>
"""Behavioral Game Theory Analysis of Cybersecurity With Deception and IDS"" presents a comprehensive study of cybersecurity... Read More >>
Behavior-based authentication is a relatively new approach that has gained traction in recent years for protecting... Read More >>
Read More >>
The book offers an essential overview for researchers who are new to the field, while also equipping them to explore... Read More >>
"In today's world, smartphones have become an integral part of our lives, and we use them for various purposes such... Read More >>
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for... Read More >>
It's been 50 years since the discipline of cybersecurity originated, but users and developers still spread and succumb... Read More >>
Designed for students and professionals, this text introduces the major concepts of cybersecurity using numerous... Read More >>
Cloud computing is a development approach for giving pay-per-user access to shared resources for particular frameworks,... Read More >>
The book is a collection of high-quality research papers presented at 7th Euro-China Conference on Intelligent Data... Read More >>
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops... Read More >>
"Automate Network Infrastructure, Optimize Network Performance, and Analyze Packets with Rust Ecosystem Rust for... Read More >>
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered... Read More >>
With the transition to the information age, a large amount of personal data has begun to be collected through technology.... Read More >>
Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility... Read More >>
Network security paradigm should be the one that permeates the enterprise, including people, processes and technology.... Read More >>
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and... Read More >>
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with... Read More >>
This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This ... Read More >>