Free Delivery Over $100
10024 books were found.
Have you always been curious about hacking? Have you also had a misconception about the term Ethical Hacking? Would... Read More >>
The key to preventing online child predation is Stakeholder Involvement. Parents and guardians need to place themselves... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application... Read More >>
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware,... Read More >>
This book presents state-of-the-art contributions from scientists and practitioners working in intrusion detection... Read More >>
There is a resurgence of interest in the security of data transmission in wireless systems from physical layer point... Read More >>
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy... Read More >>
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains,... Read More >>
The book, 'Linux for Hackers: The Advanced Guide on Kali Linux Operating System, ' contains condensed knowledge... Read More >>
Whether you are a Kali Linux beginner or a professional, this book is for you. This book provides a thorough explanation... Read More >>
Read More >>
This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security... Read More >>
This book constitutes the proceedings of the Second International Conference on HCI for Cybersecurity, Privacy and... Read More >>
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference... Read More >>
Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives... Read More >>
Presents research on the methods and applied aspects of security in IoT-based systems by discussing core concepts... Read More >>
This two-volume set LNCS 12131 and LNCS 12132 constitutes the refereed proceedings of the 17th International Conference... Read More >>
A nuts-and-bolts explanation of cryptography from a leading expert in information security. Read More >>
This book includes selected papers from the International Conference on Data Science and Intelligent Applications... Read More >>
This book constitutes the refereed proceedings of the First International Conference on Artificial Intelligence... Read More >>
Securing and hardening your Windows environment will enhance protection to secure your company's data and users.... Read More >>