Free Delivery Over $100
10034 books were found.
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically... Read More >>
The book explores comprehensive demonstration of the performance analytics following the implementation of the authentication... Read More >>
This unique new volume analyses source documents both previously known and recently declassified, generating an... Read More >>
Read More >>
Bringing together leading specialists from many fields on information resilience, this book examines how to ensure... Read More >>
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future:... Read More >>
In diesem Buch werden vor allem der Forschungsüberblick, die Forschungsergebnisse und die weiteren Aussichten von... Read More >>
The book presents select proceedings of the 3rd International Conference on “Artificial-Business Analytics, Quantum... Read More >>
This book provides a holistic overview of current state of the art and practice in malware research as well as the... Read More >>
This textbook considers cases and materials introducing European Union (EU) data protection law to data protection... Read More >>
Embark on a journey to business evolution grounded in the real-world experiences and challenges faced by those at... Read More >>
The two-volume set CCIS 2225 and 2226 constitutes the proceedings of the Second International Conference on Information... Read More >>
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference... Read More >>
This volume gives readers an understanding of the multifaceted threats posed by the evolving cybersecurity landscape... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
The two-volume set IFIP AICT 721 +722 constitutes the proceedings of the 18th IFIP WG 11.12 International Symposium... Read More >>
The two-volume set IFIP AICT 721 + 722 constitutes the proceedings of the 18th IFIP WG 11.12 International Symposium... Read More >>
Covering every aspect of computer and network security, this comprehensive handbook is packed with detailed, practical... Read More >>
Most businesses rely on servers to manage the heavy lifting. Servers handle vital tasks like authenticating users... Read More >>
Learn how to protect PHP applications from potential vulnerabilities and attacks. As cyberattacks and data breaches... Read More >>