Free Delivery Over $100
10024 books were found.
Read More >>
This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography... Read More >>
This book constitutes the proceedings of the 17th International Conference on Engineering Psychology and Cognitive... Read More >>
"Somebody hacks you online. You click a link should not have clicked. You look at the resulting web page without... Read More >>
This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail... Read More >>
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and... Read More >>
Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers... Read More >>
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors,... Read More >>
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications... Read More >>
This book addresses the key security challenges in the big data centric computing and network systems, and discusses... Read More >>
The book starts with an introduction to hacking and explaining the types of hackers. This is followed by: Using... Read More >>
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled... Read More >>
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get... Read More >>
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies... Read More >>
Beginning-Intermediate user level Read More >>
This book provides a critique of dominant cybersecurity knowledge that draws upon original constructivist analysis... Read More >>
Mi libro perfecto de contrasenas. Cuantas veces no nos a pasado que tenemos muchas cuentas en redes sociales, bancos,... Read More >>
For advanced undergraduate courses in cryptography and network security in departments of math and computer science.... Read More >>
"The book you have been waiting for to make you a Master of TShark Network Forensics, is finally here!!! Be it you... Read More >>
Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You... Read More >>
Presents innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies... Read More >>