Free Delivery Over $100
10024 books were found.
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay... Read More >>
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding... Read More >>
In this book, you're going to be learning a lot of the key concepts that major hackers say that you need to understand... Read More >>
This book constitutes the proceedings of the Blockchain and RPA Forum, held as part of the 19th International Conference... Read More >>
There are a lot of books on the market intended for people who want to hack. A lot of them have one thing in common:... Read More >>
Read More >>
Popular computer hackers are generally in agreeance about what makes a strong contender in the hacking culture.... Read More >>
Disinformation campaigns on social media pose a nuanced threat to the United States, but the response remains ad... Read More >>
The authors identify key Chinese practices and the supporting infrastructure and conditions that successful social... Read More >>
Ethical hacking is a profession that has gained popularity in the last few years. Network security and cyber security... Read More >>
Cybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and... Read More >>
This guidebook is going to spend some time taking a look at the world of hacking, and some of the great techniques... Read More >>
This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information... Read More >>
Gaussian integers are a subset of the complex numbers with integers as real and imaginary parts. For the elliptic... Read More >>
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of... Read More >>
Previous edition: Indianapolis, Ind.: Que, 2009. Read More >>
Konzerne wie Geheimdienste wissen immer mehr über uns. Das Internet ist voll von Werbung, die uns regelrecht verfolgt.... Read More >>
Advanced security topics such as secure remote work, data security, network security, application and device security,... Read More >>
The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and... Read More >>
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems... Read More >>
This book uncovers the idea of understanding cybersecurity management in FinTech. The book delves into understanding... Read More >>