Free Delivery Over $100
10034 books were found.
Provides the guide to deploying and maintaining a secure Windows network. This book drills down into all the features... Read More >>
To code, or not to code? Bill Gates, Mark Zuckerberg, will.i.am, and other luminaries appeared in a 2013 YouTube... Read More >>
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013,... Read More >>
The book is divided into two parts. Part 1 deals with cyber warfare in general bringing out the unique characteristics... Read More >>
Read More >>
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime... Read More >>
"A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume... Read More >>
This book proposes a new model—the IrisCryptoAgentSystem (ICAS)—based on a biometric method for authentication using... Read More >>
"A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history... Read More >>
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based... Read More >>
The papers have been organized into topical sections on privacy and identity management, anonymous credentials,... Read More >>
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just... Read More >>
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on... Read More >>
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering... Read More >>
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus... Read More >>
From the author of Facebook Nation In Amy Webb's 2013 TED talk titled How I hacked online dating, she said that... Read More >>
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely... Read More >>
The purpose of our hearing is to examine the evolving computer hacking threats from nation-states and hacker groups... Read More >>
The more integrated technology becomes in our everyday lives and businesses, the more vital it grows that its applications... Read More >>
The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological... Read More >>