Free Delivery Over $100
9668 books were found.
"""Cloud Security and Compliance: A Practical Guide"" offers a comprehensive exploration into the essential aspects... Read More >>
"In the ever-evolving landscape of cybersecurity, proficiency in Command and Control (C2) frameworks is not just... Read More >>
Read More >>
"As technology advances at an unprecedented pace, the landscape of cybersecurity is evolving rapidly, presenting... Read More >>
This practical book provides a detailed explanation of the zero trust security model. The updated edition offers... Read More >>
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International... Read More >>
Supply chains are experiencing a seismic shift towards customer-centricity and sustainability and the challenges... Read More >>
"All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges,... Read More >>
"Embark on a transformative expedition into the realm of cybersecurity with ""A Journey into Cybersecurity: Mastering... Read More >>
Explores the foundational elements of the Internet of Things, delving into the convergence of IoT and smart city... Read More >>
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography... Read More >>
Offers a comprehensive exploration of the critical cybersecurity problems faced by the rapidly expanding drone industry.... Read More >>
Discusses the emerging challenges in healthcare privacy as well as the technologies, methodologies, and emerging... Read More >>
As cybersecurity threats continue to grow in scale and complexity, it is crucial to explore new and innovative solutions... Read More >>
In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals... Read More >>
Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies... Read More >>
In the dynamic field of modern business, where cloud computing has become the primary focus of operations, a pressing... Read More >>
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information... Read More >>
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference... Read More >>
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. Read More >>
"In today's digital age, the importance of safeguarding your data and online presence cannot be overstated. ""Cybersecurity... Read More >>