Free Delivery Over $100
10024 books were found.
This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This ... Read More >>
Use Microsoft's own intelligent security service that brings together cloud security and AI to protect your organization.... Read More >>
Work through helpful recipes to use Zabbix for building scalable and customizable enterprise monitoring solutions... Read More >>
This book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn... Read More >>
They cover topics in AI Modeling, AI Analysis, AI and Mobile Applications, AI Architecture, AI Management, AI Engineering,... Read More >>
Read More >>
This book constitutes selected and revised papers from the Second Silicon Valley Cybersecurity Conference, held... Read More >>
Hash functions are the cryptographer’s Swiss Army knife. Even though they play an integral part in today’s cryptography,... Read More >>
An original deep history of the internet that tells the story of the centuries-old utopian dreams behind it--and... Read More >>
What will you learn from this book? Why and how the European General Data Protection Regulation (GDPR) impacts... Read More >>
This book constitutes the proceedings of the 4th International Conference on Blockchain, ICBC 2021, held as part... Read More >>
This book covers a variety of topics that span from industry to academics: hybrid AI model for IDS in IoT, intelligent... Read More >>
This CISSP preparation book is unique. It only outlines a critical part along with practice questions on a particular... Read More >>
Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing,... Read More >>
DNS The world's most successful distributed database-and the most naïve. The Domain Name System is one of... Read More >>
This book constitutes the refereed proceedings of six International Workshops that were held in conjunction with... Read More >>
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges... Read More >>
Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning,... Read More >>
This book presents the latest research in the fields of computational intelligence, ubiquitous computing models,... Read More >>
Digital connections permeate our lives--and so do data breaches. Given that we must be online for basic communication,... Read More >>
the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches.This... Read More >>
The book is an introduction to essential concepts of cybersecurity and information security and the methods and... Read More >>
This book presents methods to solve emerging problems while mainstreaming adoption of WoT applications. The book... Read More >>