Add Wish List Add to Cart The item has been added Information Science and Applications 2018 This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security... RRP: $498.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Big Data Processing Using Spark in Cloud The book describes the emergence of big data technologies and the role of Spark in the entire big data stack. It compares Spark and Hadoop and identifies the shortcomings of Hadoop that have been overcome by Spark. The book mainly focuses on the in-depth... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added International Conference on Computer Networks and Communication Technologies The book features research papers presented at the International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2018), offering significant contributions from researchers and practitioners in academia and industry. The... RRP: $357.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Predictive Computing and Information Security This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art... RRP: $194.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computing and Network Sustainability The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable... RRP: $357.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer Communication, Networking and Internet Security The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft... RRP: $530.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Group-target Tracking This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the... RRP: $200.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Proceedings of the International Congress on Information and Communication Technology This volume contains 69papers presented at ICICT 2015: International Congress on Information andCommunication Technology. The conference was held during 9th and 10thOctober, 2015, Udaipur, India and organized by CSI Udaipur Chapter, DivisionIV, SIG-WNS,... RRP: $442.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Supply Chain Software Security Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has... RRP: $136.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced ASP.NET Core 8 Security Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the... RRP: $136.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Future of Cybersecurity "The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices" explores how cybersecurity is developing and provides information on the best practices, tools, and strategies required to protect digital assets in a... RRP: $37.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity and Privacy Law Introduction LOCKIN your organization's COMPLIANCE! KNOW THE LAWThis is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice:Know what laws apply: Navigate... RRP: $56.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Get Smart Master the fundamentals of secure smart contract development using Solidity. Learn battle-tested patterns for preventing common vulnerabilities, implementing access controls, and building upgradeable contracts. Covers gas optimization, testing... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Online Safety Made Simple A straightforward guide for seniors on how to stay safe and secure online. This book explains how to recognize scams, protect your data, and build confidence in navigating the internet. RRP: $41.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to Confidential Computing DESCRIPTION In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats... RRP: $59.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Open Source Intelligence (OSINT) - A practical Introduction This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking techniques, privacy best practices for OSINT... RRP: $149.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Methodology to Improve Control Plane Security in SDN Environments This book unveils a blueprint for safeguarding the very backbone of modern communication networks. It offers a roadmap towards fortifying SDN infrastructures against the relentless onslaught of cyber threats, ensuring resilience and reliability in an... RRP: $180.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Space and Outer Space Security This book delves into cutting-edge research, encompassing both theoretical and experimental aspects, as well as innovations in the domains of cyberspace and outer space security. RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Technical Innovation, solving the Data Spaces and Marketplaces Interoperability Problems for the Global Data-Driven Economy This book focuses on the best practices and simplest software methods and mechanisms that allow the i3-MARKET backplane reference implementation to be instantiated, tested and validated. RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Password Book for Seniors Introducing our Password Book for Seniors - a Personal Internet Organizer created with seniors in mind. This user-friendly book neatly organizes all your usernames, logins, and web addresses in an alphabetical format for swift and easy access. The... RRP: $17.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Cybersecurity Simplified In today's interconnected world, cybersecurity is no longer optional-it's a necessity. Cybersecurity Simplified offers a clear and comprehensive guide to understanding the complexities of cybersecurity, tailored for those new to the field. Whether you're... RRP: $31.89 $31.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computational Intelligence, Cyber Security and Computational Models This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3)... RRP: $739.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Multimedia-Assistenten im Betrieb Roland Steidle untersucht, wie Assistenzsysteme in einem verteilten System datenschutzkonform gestaltet werden können. Er leitet technische Gestaltungs- und rechtliche Regelungsvorschläge aus gesetzlichen Vorgaben ab und bietet... RRP: $173.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added ISSE 2011 Securing Electronic Business Processes RRP: $178.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Engineering for Vehicular IT Systems Marko Wolf provides a comprehensive overview of the emerging area of vehicular IT security. Having identified potential threats, attacks, and attackers for current and future vehicular IT applications, the author presents... RRP: $178.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Ich hacke Technik Ich bin das, was man als Hacker bezeichnet. Knapp 50 Jahre alt und suche in der letzten Hälfte meines Arbeitslebens nochmal einen so richtig coolen Job. Aber leider reißen sich die Arbeitgeber um mich. Für den Job, den ich seit 20 Jahren mache,... RRP: $53.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hacking with Python and Kali-Linux Python is an easy to learn, yet very diverse and powerful programming language and that for the language of choice for many hackers.Learn to write your own tools and use them on Kali Linux to see how hackers attack systems and exploit vulnerabilities... RRP: $62.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Als IT-Security Officer zertifiziert Die Ausbildung zum IT-Security Officer (ITSO) oder zum IT-Security-Beauftragten ist auf dem Weg, ein festes Berufsbild zu etablieren.Zertifizierungen durch TüV und andere Organisationen werden aller Orten verlangt. Selbst der IT-Security-Beauftragte oder... RRP: $48.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hacken mit Python und Kali-Linux Python ist eine leicht zu erlernende und dennoch eine sehr vielfältige und mächtige Programmiersprache. Lernen Sie mit der bevorzugten Sprache vieler Hacker, Ihre eigenen Tools zu schreiben und diese unter Kali-Linux einzusetzen, um zu sehen, wie Hacker... RRP: $59.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation Projektarbeit aus dem Jahr 2016 im Fachbereich Informatik - IT-Security, Note: 1, Fachhochschule Düsseldorf, Veranstaltung: Informatikprojekt 1, Sprache: Deutsch, Abstract: Das Ziel des Projekts ist es, zu zeigen, warum der WEP-Standard unsicher ist und... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Experimentalanalyse diverser Brute-Force-Mechanismen in Linux Kali. Passwortsicherheit und Passwortkomplexität Bachelorarbeit aus dem Jahr 2015 im Fachbereich Informatik - IT-Security, Note: 1 B, Fachhochschule Burgenland, Sprache: Deutsch, Abstract: Die vorliegende Bachelorarbeit beinhaltet eine umfangreiche Analyse von Brute-Force-Mechanismen mit besonderem... RRP: $121.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Subjective Value of Privacy This book critically examines the subjective value of privacy in the context of state surveillance, exploring how individuals assess costs and benefits of surveillance. It delves into the complex relationship between attitudes towards privacy, security,... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with... RRP: $187.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Die Fortentwicklung des Datenschutzes Der Datenschutz ist nicht ausreichend auf die Herausforderungen moderner Informationstechnik mit Ubiquitous Computing, Big Data, künstlicher Intelligenz und lernenden Systemen eingestellt. Dies gilt auch für die Datenschutz‐Grundverordnung. Die Beiträge... RRP: $214.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added German Yearbook on Business History 1988 RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added iNetSec 2009 - Open Research Problems in Network Security Involving Humans.- On the Design of Forgiving Biometric Security Systems.- Remotely Telling Humans and Computers Apart: An Unsolved Problem.- Web 2.0.- Leveraging Social Links for Trust and Privacy in Networks.- Open Problems in Web 2.0 User Content... RRP: $214.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer Security - ESORICS 2011 This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers included in the book were carefully reviewed and... RRP: $206.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Digital Forensics VII Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of... RRP: $166.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Studies in Complexity and Cryptography This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far... RRP: $162.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Chaos-based Cryptography Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such... RRP: $442.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - ASIACRYPT 2010 ASIACRYPT 2010 was held in the Swissˆ otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and... RRP: $206.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organised by the International Federation for Information Processing (IFIP). In the... RRP: $178.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added NETWORKING 2010 This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design... RRP: $191.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security, Practice and Experience The 6th International Conference on Information Security Practice and Expe- ence (ISPEC 2010) was held in Seoul, Korea, May 12-13, 2010. The ISPEC conference series is an established forum that brings together - searchers and... RRP: $154.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Progress in Cryptology - AFRICACRYPT 2010 Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency... RRP: $191.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added High Performance Networking, Computing, Communication Systems, and Mathematical Foundations The 2009 International Conference on High-Performance Networking, Computing and Communication Systems and the 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC -ICTMF 2009)... RRP: $154.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Distibuted Computing and Networking RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in Computing Systems Challenges and Basic Approaches.- Fundamental Challenges.- Computing Systems and Their Basic Vulnerabilities.- Fundamentals of Information Flow and Inference Control.- Messages, Inferences, Information and Knowledge.- Preventive Inference Control.-... RRP: $200.00 Add to Cart The item has been added