Free Delivery Over $100
10034 books were found.
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security... Read More >>
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security... Read More >>
Cloud Computing Protected describes the most important security challenges that organizations face by adopting... Read More >>
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International... Read More >>
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on... Read More >>
In order to catch a thief, it takes a thief. In order to catch a hacker, it takes a hacker. In order to catch an... Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013,... Read More >>
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including... Read More >>
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores... Read More >>
This book explores security risks and vulnerabilities of computer networks and networked devices, offering improved... Read More >>
Tired of being spied on? Encrypt yourself online and get free access to thousands of dark web sites, deep web portals,... Read More >>
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial,... Read More >>
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain... Read More >>
This text examines police administration from multiple perspectives: a systems perspective (emphasizing the interrelatedness... Read More >>
Read More >>
Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on,... Read More >>
Identity authentication and authorization are integral tasks in the digital world. This book describes technology... Read More >>
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's... Read More >>
A large international conference on Advances in Machine Learning and Systems Engineering was held in UC Berkeley,... Read More >>
This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications,... Read More >>
To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>