Add Wish List Add to Cart The item has been added Burners and Black Markets Tired of being spied on? Encrypt yourself and explore a deep web of exotic goods, banned items & secret files, anonymously and free. Instantly. If you want to live the life of a superhacker, spy or CIA agent, be James Bond or Ethan Hunt for a time... RRP: $45.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Basics on Public Key Infrastructure (PKI) Discover the intricacies of Public Key Infrastructure (PKI) with this comprehensive book. Explore the basics of cryptography and digital signatures, learn about the vital role digital certificates play in establishing trust, and gain a deeper... RRP: $28.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A Study in Protocol Obfuscation Techniques and their Effectiveness Master's Thesis from the year 2017 in the subject Computer Science - IT-Security, grade: 4, Oxford University, language: English, abstract: There are two main reasons for people to hide their network communication. Some want to maintain their privacy,... RRP: $117.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Big Data im Marketing. Wenn Datenschutz und Wirtschaft aufeinandertreffen Studienarbeit aus dem Jahr 2021 im Fachbereich BWL - Offline-Marketing und Online-Marketing, Note: 1,7, , Sprache: Deutsch, Abstract: Inwieweit können Unternehmen anhand von gesammelten Daten ihre Nutzer auch offline steuern? Wer sich heute an... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Your Short Guide to Security Systems Did you know that a home without a security system is three times more likely to be targeted for a break-in than one with an alarm fitted?This is a sobering thought, and another is that, according to the FBI, an intrusion occurs every 15 seconds in the... RRP: $29.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Law, Standards and Regulations ASIS Book of The Year Runner Up. Selected by ASIS International, the world's largest community of security practitioners.In today's litigious business world, cyber-related matters could land you in court. As a computer security professional, you are... RRP: $167.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Cybersecurity Architecture Plan and design robust security architectures to secure your organization's technology landscape and the applications you developKey FeaturesLeverage practical use cases to successfully architect complex security structuresLearn risk assessment... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crafting Test-Driven Software with Python Get to grips with essential concepts and step-by-step explanations to apply TDD practices to your Python projects while keeping your test suite under controlKey Description:Build robust Python applications using TDD and BDD methodologiesTest Python web... RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Blockchain Development RRP: $104.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Forensics and Incident Response - Second Edition Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Modern Cryptography for Cybersecurity Professionals As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at... RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Microsoft Cybersecurity Architect Exam Ref SC-100 - Second Edition Unlock your potential to pass the SC-100 exam by mastering advanced cloud security strategies, designing zero-trust architectures, and evaluating cybersecurity frameworks with this latest exam guidePurchase of this book unlocks access to web-based exam... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptography Algorithms - Second Edition Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptographyPurchase of the print or Kindle book includes a free eBook in PDF... RRP: $104.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Unveiling the NIST Risk Management Framework (RMF) Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risksKey Features- Implement NIST RMF with step-by-step instructions for effective security operations- Draw insights... RRP: $67.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Career Master Plan Get started with cybersecurity and progress with the help of expert tips to get certified, find a job, and moreKey Features:Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurityExplore expert tips... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Kali Linux Web Penetration Testing Cookbook RRP: $114.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added DevSecOps A structured approach to integrating security capabilities into your engineering process is an essential requirement for producing secure software without compromising the integrity of the DevOps framework.DevSecOps provides a... RRP: $36.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Protection Officer This practical guide to the DPO role encompasses the key activities you'll need to manage to succeed as a DPO. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips... RRP: $43.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Applications of Blockchain and Big IoT Systems This new volume explores a plethora of blockchain-based solutions for big data and IoT applications, looking at advances in real-world applications in several sectors, including higher education, cybersecurity, agriculture, business and management,... RRP: $377.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer Hacking COMPUTER HACKINGComputer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking. Inside, you will learn the basics of hacking for beginners.This includes the different types of hacking,... RRP: $18.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Image-Based Spam Detection and Filtering Techniques Security technologies have advanced at an accelerated pace in the past few decades. These advancements in cyber security have benefitted many organizations and companies interested in protecting their virtual assets. Advanced Image-Based Spam Detection... RRP: $396.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added DevOps for Trustworthy Smart IoT Systems ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU.The overall goal of the ENACT project was to provide a... RRP: $284.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Methods, Implementation, and Application of Cyber Security Intelligence and Analytics Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies... RRP: $543.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome,... RRP: $430.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances... RRP: $430.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cross-Industry Applications of Cyber Security Frameworks Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as... RRP: $565.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Business Aspects of Cybersecurity Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees... RRP: $1,062.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Privatizing and Securing Data, VOL 2 RRP: $826.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Securing Mobile Technologies and Applications, VOL 2 RRP: $337.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Artificial Intelligence Applications in Security, VOL 4 RRP: $583.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Artificial Intelligence Applications in Security, VOL 3 RRP: $583.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Artificial Intelligence Applications in Security, VOL 2 RRP: $583.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Artificial Intelligence Applications in Security, VOL 1 RRP: $583.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Research on Cyber Crime and Information Privacy, VOL 1 RRP: $417.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Warfare and Terrorism RRP: $615.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Privatizing and Securing Data, VOL 4 RRP: $826.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Privatizing and Securing Data, VOL 3 RRP: $826.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Privatizing and Securing Data, VOL 1 RRP: $826.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Anthology on Securing Mobile Technologies and Applications, VOL 1 RRP: $337.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Research on Cyber Crime and Information Privacy, VOL 2 RRP: $417.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Law, Privacy, and Security RRP: $559.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security and Threats RRP: $559.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Certification and Security in Health-Related Web Applications Health-related Web applications have provided advanced services, such as telemedicine, to patients and doctors. However, with the creation of these applications has come the need to record, process and store medical information by following standard and... RRP: $554.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Streaming Media Architectures, Techniques, and Applications Streaming media is one of the most exciting and active research topics with continuing significant progress in the multimedia area, where streaming media has been experiencing dramatic growth and stepped into mainstream media communications. Streaming... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Developments in Healthcare Information Systems and Technologies The need for continual development and transformation of healthcare information systems is evident, though progress in this arena is often met with a significant number of challenges. Developments in Healthcare Information Systems and Technologies:... RRP: $554.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Pervasive Information Security and Privacy Developments Privacy and security concerns are at the forefront of research and critical study in the prevalence of information technology. Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical,... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Surveillance Technologies and Early Warning Systems The modern world is fraught with risk, from natural disasters and terrorist attacks, to financial crises and pandemics. Assessing and planning for these risks can be done with a conventional human-based approach but this often requires large amounts of... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in Virtual Worlds, 3D Webs, and Immersive Environments Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications, very little is... RRP: $407.00 Add to Cart The item has been added