Free Delivery Over $100
10024 books were found.
"""The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks,... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec... Read More >>
A detailed enumeration of activities, a synthesis of expert consensus on challenges to gray zone competition, and... Read More >>
This book will explain the origins and details of the 'parasocial relationship.' Read More >>
In diesem Open-Access-Buch stehen die wirtschaftliche Verwertung von Daten und die dazu gehörenden technischen und... Read More >>
This book presents various areas related to cybersecurity. The content of the book is prepared to work as a resource... Read More >>
In introducing the National Security Commission on AI’s final report, Eric Schmidt, former Google CEO, and Robert... Read More >>
This open access book discusses the most modern approach to auditing complex digital systems and technologies. Especially... Read More >>
However, the openness and weak communication characteristics of USNs make underwater localization much more challenging... Read More >>
""Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based information systems... Read More >>
Cybercriminals can ruin your life-this book teaches you to stop them before they can. Read More >>
A comprehensible guide to network security. It explains the developments in this field that has become so critical... Read More >>
The perfect introduction to the principles of information security management and ISO 27001:2022. Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
El grooming aparece como la encarnación de nuestra peor pesadilla: un niño o niña, quizás nuestro propio hijo, engañado... Read More >>
"""This book centers on the basics of cybersecurity innovation alongside the methods and strategies for organizations... Read More >>
Considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry... Read More >>
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International... Read More >>
"In today's world, Internet of Things is an attention grabbing area of research. IoT has become popular because... Read More >>
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks... Read More >>
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the... Read More >>