Computer security Books

Sidebar Sidebar Sidebar
  • Information Science and Applications 2018 Information Science and Applications 2018
    Add to Cart The item has been added

    Information Science and Applications 2018

    This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security...
    $498.00

    Add to Cart The item has been added
  • Big Data Processing Using Spark in Cloud Big Data Processing Using Spark in Cloud
    Add to Cart The item has been added

    Big Data Processing Using Spark in Cloud

    The book describes the emergence of big data technologies and the role of Spark in the entire big data stack. It compares Spark and Hadoop and identifies the shortcomings of Hadoop that have been overcome by Spark. The book mainly focuses on the in-depth...
    $227.00

    Add to Cart The item has been added
  • Predictive Computing and Information Security Predictive Computing and Information Security
    Add to Cart The item has been added

    Predictive Computing and Information Security

    This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art...
    $194.00

    Add to Cart The item has been added
  • Computing and Network Sustainability Computing and Network Sustainability
    Add to Cart The item has been added

    Computing and Network Sustainability

    The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st  and 2nd July 2016. The areas covered in the book are sustainable...
    $357.00

    Add to Cart The item has been added
  • Group-target Tracking Group-target Tracking
    Add to Cart The item has been added

    Group-target Tracking

    This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the...
    $200.00

    Add to Cart The item has been added
  • Supply Chain Software Security Supply Chain Software Security
    Add to Cart The item has been added

    Supply Chain Software Security

    Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has...
    $136.00

    Add to Cart The item has been added
  • Advanced ASP.NET Core 8 Security Advanced ASP.NET Core 8 Security
    Add to Cart The item has been added

    Advanced ASP.NET Core 8 Security

    Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the...
    $136.00

    Add to Cart The item has been added
  • The Future of Cybersecurity The Future of Cybersecurity
    Add to Cart The item has been added

    The Future of Cybersecurity

    "The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices" explores how cybersecurity is developing and provides information on the best practices, tools, and strategies required to protect digital assets in a...
    $37.00

    Add to Cart The item has been added
  • Cybersecurity and Privacy Law Introduction Cybersecurity and Privacy Law Introduction
    Add to Cart The item has been added

    Cybersecurity and Privacy Law Introduction

    LOCKIN your organization's COMPLIANCE! KNOW THE LAWThis is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice:Know what laws apply: Navigate...
    $56.00

    Add to Cart The item has been added
  • Get Smart
    Add to Cart The item has been added

    Get Smart

    Master the fundamentals of secure smart contract development using Solidity. Learn battle-tested patterns for preventing common vulnerabilities, implementing access controls, and building upgradeable contracts. Covers gas optimization, testing...
    $73.00

    Add to Cart The item has been added
  • Online Safety Made Simple Online Safety Made Simple
    Add to Cart The item has been added

    Online Safety Made Simple

    A straightforward guide for seniors on how to stay safe and secure online. This book explains how to recognize scams, protect your data, and build confidence in navigating the internet.
    $41.00

    Add to Cart The item has been added
  • Introduction to Confidential Computing Introduction to Confidential Computing
    Add to Cart The item has been added

    Introduction to Confidential Computing

    DESCRIPTION In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats...
    $59.00

    Add to Cart The item has been added
  • Cyber Space and Outer Space Security Cyber Space and Outer Space Security
    Add to Cart The item has been added

    Cyber Space and Outer Space Security

    This book delves into cutting-edge research, encompassing both theoretical and experimental aspects, as well as innovations in the domains of cyberspace and outer space security.
    $282.00

    Add to Cart The item has been added
  • Password Book for Seniors Password Book for Seniors
    Add to Cart The item has been added

    Password Book for Seniors

    Introducing our Password Book for Seniors - a Personal Internet Organizer created with seniors in mind. This user-friendly book neatly organizes all your usernames, logins, and web addresses in an alphabetical format for swift and easy access. The...
    $17.00

    Add to Cart The item has been added
  • sale
    Cybersecurity Simplified Cybersecurity Simplified
    Add to Cart The item has been added

    Cybersecurity Simplified

    In today's interconnected world, cybersecurity is no longer optional-it's a necessity. Cybersecurity Simplified offers a clear and comprehensive guide to understanding the complexities of cybersecurity, tailored for those new to the field. Whether you're...
    RRP: $31.89
    $31.00

    Add to Cart The item has been added
  • Multimedia-Assistenten im Betrieb Multimedia-Assistenten im Betrieb
    Add to Cart The item has been added

    Multimedia-Assistenten im Betrieb

    Roland Steidle untersucht, wie Assistenzsysteme in einem verteilten System datenschutzkonform gestaltet werden können. Er leitet technische Gestaltungs- und rechtliche Regelungsvorschläge aus gesetzlichen Vorgaben ab und bietet...
    $173.00

    Add to Cart The item has been added
  • Security Engineering for Vehicular IT Systems Security Engineering for Vehicular IT Systems
    Add to Cart The item has been added

    Security Engineering for Vehicular IT Systems

    Marko Wolf provides a comprehensive overview of the emerging area of vehicular IT security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents...
    $178.00

    Add to Cart The item has been added
  • Ich hacke Technik Ich hacke Technik
    Add to Cart The item has been added

    Ich hacke Technik

    Ich bin das, was man als Hacker bezeichnet. Knapp 50 Jahre alt und suche in der letzten Hälfte meines Arbeitslebens nochmal einen so richtig coolen Job. Aber leider reißen sich die Arbeitgeber um mich. Für den Job, den ich seit 20 Jahren mache,...
    $53.00

    Add to Cart The item has been added
  • Hacking with Python and Kali-Linux Hacking with Python and Kali-Linux
    Add to Cart The item has been added

    Hacking with Python and Kali-Linux

    Python is an easy to learn, yet very diverse and powerful programming language and that for the language of choice for many hackers.Learn to write your own tools and use them on Kali Linux to see how hackers attack systems and exploit vulnerabilities...
    $62.00

    Add to Cart The item has been added
  • Als IT-Security Officer zertifiziert Als IT-Security Officer zertifiziert
    Add to Cart The item has been added

    Als IT-Security Officer zertifiziert

    Die Ausbildung zum IT-Security Officer (ITSO) oder zum IT-Security-Beauftragten ist auf dem Weg, ein festes Berufsbild zu etablieren.Zertifizierungen durch TüV und andere Organisationen werden aller Orten verlangt. Selbst der IT-Security-Beauftragte oder...
    $48.00

    Add to Cart The item has been added
  • Hacken mit Python und Kali-Linux Hacken mit Python und Kali-Linux
    Add to Cart The item has been added

    Hacken mit Python und Kali-Linux

    Python ist eine leicht zu erlernende und dennoch eine sehr vielfältige und mächtige Programmiersprache. Lernen Sie mit der bevorzugten Sprache vieler Hacker, Ihre eigenen Tools zu schreiben und diese unter Kali-Linux einzusetzen, um zu sehen, wie Hacker...
    $59.00

    Add to Cart The item has been added
  • The Subjective Value of Privacy The Subjective Value of Privacy
    Add to Cart The item has been added

    The Subjective Value of Privacy

    This book critically examines the subjective value of privacy in the context of state surveillance, exploring how individuals assess costs and benefits of surveillance. It delves into the complex relationship between attitudes towards privacy, security,...
    $227.00

    Add to Cart The item has been added
  • Die Fortentwicklung des Datenschutzes Die Fortentwicklung des Datenschutzes
    Add to Cart The item has been added

    Die Fortentwicklung des Datenschutzes

    Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, künstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch für die Datenschutz‐Grundverordnung. Die Beiträge...
    $214.00

    Add to Cart The item has been added
  • iNetSec 2009 - Open Research Problems in Network Security iNetSec 2009 - Open Research Problems in Network Security
    Add to Cart The item has been added

    iNetSec 2009 - Open Research Problems in Network Security

    Involving Humans.- On the Design of Forgiving Biometric Security Systems.- Remotely Telling Humans and Computers Apart: An Unsolved Problem.- Web 2.0.- Leveraging Social Links for Trust and Privacy in Networks.- Open Problems in Web 2.0 User Content...
    $214.00

    Add to Cart The item has been added
  • Computer Security - ESORICS 2011 Computer Security - ESORICS 2011
    Add to Cart The item has been added

    Computer Security - ESORICS 2011

    This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers included in the book were carefully reviewed and...
    $206.00

    Add to Cart The item has been added
  • Advances in Digital Forensics VII Advances in Digital Forensics VII
    Add to Cart The item has been added

    Advances in Digital Forensics VII

    Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...
    $166.00

    Add to Cart The item has been added
  • Studies in Complexity and Cryptography Studies in Complexity and Cryptography
    Add to Cart The item has been added

    Studies in Complexity and Cryptography

    This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far...
    $162.00

    Add to Cart The item has been added
  • Chaos-based Cryptography Chaos-based Cryptography
    Add to Cart The item has been added

    Chaos-based Cryptography

    Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such...
    $442.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT 2010
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT 2010

    ASIACRYPT 2010 was held in the Swissˆ otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and...
    $206.00

    Add to Cart The item has been added
  • NETWORKING 2010
    Add to Cart The item has been added

    NETWORKING 2010

    This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design...
    $191.00

    Add to Cart The item has been added
  • Information Security, Practice and Experience Information Security, Practice and Experience
    Add to Cart The item has been added

    Information Security, Practice and Experience

    The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12-13, 2010. The ISPEC conference series is an established forum that brings together - searchers and...
    $154.00

    Add to Cart The item has been added
  • Progress in Cryptology - AFRICACRYPT 2010 Progress in Cryptology - AFRICACRYPT 2010
    Add to Cart The item has been added

    Progress in Cryptology - AFRICACRYPT 2010

    Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency...
    $191.00

    Add to Cart The item has been added
  • Security in Computing Systems Security in Computing Systems
    Add to Cart The item has been added

    Security in Computing Systems

    Challenges and Basic Approaches.- Fundamental Challenges.- Computing Systems and Their Basic Vulnerabilities.- Fundamentals of Information Flow and Inference Control.- Messages, Inferences, Information and Knowledge.- Preventive Inference Control.-...
    $200.00

    Add to Cart The item has been added
Computer security