Free Delivery Over $100
9862 books were found.
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack... Read More >>
Social comparison theory (Festinger, 1954) suggests that individuals determine their worth and status in different... Read More >>
Read More >>
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security... Read More >>
This book targets IT professionals who implement and manage native security features within the Azure platform.... Read More >>
Agile Security will transform the way software teams think about security. This deeply practical guide introduces... Read More >>
This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering,... Read More >>
"Datenschutz ist für immer mehr Menschen ein wichtiges Thema, gerade auch bei Windows 11. Das beliebte Betriebssystem... Read More >>
"As design continues to impact our products, services, and solutions at scale, it is more important than ever to... Read More >>
This book present the principles of cloud computing security. From a definition of terms to key issues for service... Read More >>
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference,... Read More >>
Have you ever thought you were being followed or watched? Have you ever needed to follow or observe someone and... Read More >>
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely... Read More >>
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies,... Read More >>
This two-volume set (CCIS 1762-1763) constitutes the refereed proceedings of the 4th International Conference on... Read More >>
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order... Read More >>
This book presents the security and privacy challenges of the smart home following the logic of “terminal device... Read More >>
Data deduplication and encryption are two important techniques that can be used together to enhance the security... Read More >>