Free Delivery Over $100
10024 books were found.
Master the foundations of modern Cisco Unified Communications (UC) system security This guide helps you build... Read More >>
Buy it NOW and let your customers prevent any cyber-attacks! Read More >>
Welcome to CompTIA Cybersecurity Analyst (CySA+) CS0-002 Pearson uCertify Course and Labs CompTIA Cybersecurity... Read More >>
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors... Read More >>
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of... Read More >>
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which... Read More >>
Do you want to learn the fundamentals of ethical hacking? Do you want to have a detailed overview of all the basic... Read More >>
If you want to protect yourself and your family from the increasing risk of cyber-attacks, then keep reading. Discover... Read More >>
Quaderno compatto per annotare tutte le password che usi online Read More >>
The world r l on t hn l g m r than v r b f r . A r ult, d g t l data creation h urg d. Today, bu n... Read More >>
Si quiere descubrir cómo protegerse a sí mismo, a su familia y a su empresa de los ciberataques, entonces continúe... Read More >>
""Aligned to CompTIA security+ SYO-601 objectives.""--Cover. Read More >>
As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly... Read More >>
Read More >>
This book presents a compilation of selected papers from the Fourth International Symposium on Software Reliability,... Read More >>
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get... Read More >>
This book includes original unpublished contributions presented at the International Conference on Data Analytics... Read More >>
This book sheds light on the challenges facing social media in combating malicious accounts, and aims to introduce... Read More >>
Die Anwendung der Informations- und Kommunikationstechnik in der Energiewirtschaft mündet dabei in die sogenannte... Read More >>
When using a smartphone or computer you are putting your personal data at risk. This book explains that risk and... Read More >>
Rising concerns about the security of our data have made quantum cryptography a very active research field in recent... Read More >>