Add Wish List Add to Cart The item has been added Cyber Security, Forensics and National Security There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architectures. RRP: $315.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Fundamentals Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and... RRP: $198.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Secure Transmission of Telemedicine-Based Bio-Medical Images With the increasing reliance on telemedicine, ensuring the secure transmission of medical images is crucial for protecting patient privacy and maintaining the integrity of healthcare data. Unauthorized access, data tampering, or loss can compromise... RRP: $462.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptography in C and C++ RRP: $134.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Smiling Security Every business, large and small, is vulnerable to cyber attack. If your company isn't well protected, its systems may be compromised by sophisticated hackers with malicious intentions. Business owners, boards, CEOs, and cyber security managers must work... RRP: $49.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain and IoT Integration The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by "smart" machines. This book explores the platforms and applications of blockchain-enabled... RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added An Integrated Approach to Home Security and Safety Systems This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter home with harmful intentions. RRP: $116.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added The Zero Trust Framework In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography. RRP: $81.39 $51.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Bitcoin Trading for Beginners, Dummies & Idiots Whether you are looking to invest in bitcoin and other cryptocurrencies or understand why it will have a massive impact on your life in the near future, this book will clear out everything you need to know about what makes this technology what it... RRP: $20.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crypto Millionaires The story of Blockchain is not just a tale of mathematical experiments. It's primarily a story of the age-old attempt to record human activities and the value that flows from them. This time, however, the goal is to make it accessible to everyone on... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Stuxnet to Sunburst Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Evidence-Based Cybersecurity The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and... RRP: $163.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Crime Investigator's Field Guide Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition... RRP: $168.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Burners and Black Markets Tired of being spied on? Encrypt yourself and explore a deep web of exotic goods, banned items & secret files, anonymously and free. Instantly. If you want to live the life of a superhacker, spy or CIA agent, be James Bond or Ethan Hunt for a time... RRP: $45.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Basics on Public Key Infrastructure (PKI) Discover the intricacies of Public Key Infrastructure (PKI) with this comprehensive book. Explore the basics of cryptography and digital signatures, learn about the vital role digital certificates play in establishing trust, and gain a deeper... RRP: $28.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Cybersecurity Architecture Plan and design robust security architectures to secure your organization's technology landscape and the applications you developKey FeaturesLeverage practical use cases to successfully architect complex security structuresLearn risk assessment... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Blockchain Development RRP: $104.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Modern Cryptography for Cybersecurity Professionals As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at... RRP: $93.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptography Algorithms - Second Edition Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptographyPurchase of the print or Kindle book includes a free eBook in PDF... RRP: $104.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Chaos Synchronization and Cryptography for Secure Communications Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Identity and Access Management Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Investigating Cyber Law and Cyber Ethics Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security Standards, Practices and Industrial Applications Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy, Intrusion Detection and Response Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response:... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Crime and the Victimization of Women While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added New Technologies for Digital Crime and Forensics Central to understanding and combating digital crime is the ability to develop new methods for the collection and analysis of electronic evidence. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories,... RRP: $407.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CODASPY'19 <p>It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series... RRP: $230.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hacking for Beginners Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need... RRP: $26.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Unter dem Radar Unter dem Radar - Ausgewählte Artikel & Interviews zu Datenschutz, Informationstechnologie, Netzpolitik und Hacking.Taschenbuchausgabe.Eine Einführung in die Welt der Informationstechnologie mit folgenden Sektionen:- Überwachung & Tarnkappen- Encryption:... RRP: $64.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Warfare - Truth, Tactics, and Strategies RRP: $72.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hack the Cybersecurity Interview - Second Edition Uncover the secrets to acing interviews, decode the diverse roles in cybersecurity, and soar to new heights with expert adviceKey Features:- Confidently handle technical and soft skill questions across various cybersecurity roles- Prepare for... RRP: $85.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Quantum Computing for High School Students In 1994 Peter Shor discovered a quantum algorithm which will break most of the cryptography used in Internet communications once large scale quantum computers are built. Quantum computers are devices that operate on the principles of quantum mechanics... RRP: $52.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Conversations About Physics Volume 1 This compendium includes the following 5 complete books featuring renowned physicists Nima Arkani-Hamed, Artur Ekert, Tony Leggett, David Politzer and Paul Steinhardt providing fully accessible insights into cutting-edge academic... RRP: $66.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Digital Image Steganography Using LSB, PVD, and EMD In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive... RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptographic Security Solutions for the Internet of Things The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is... RRP: $441.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Algorithmic Strategies for Solving Complex Problems in Cryptography Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this... RRP: $554.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Solutions and Applied Cryptography in Smart Grid Communications Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid... RRP: $486.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain Development with Hyperledger RRP: $82.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crafting Secure Software Gain a solid understanding of the threat landscape and discover best practices to protect your software factory throughout the SDLC, with valuable insights from security experts at GitGuardianKey Features:- Develop a strong security posture by grasping... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The GPT-4 Crypto Revolution Discover the power of AI in the crypto world, from Bitcoin's disruptive emergence to GPT-4's cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your... RRP: $36.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Understanding Cryptography The study of the techniques that are utilized to ensure secure communication in the presence of adversaries is known as cryptography. It includes the analysis and construction of the protocols to prevent the public or third parties from reading private... RRP: $254.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hack the Cybersecurity Interview Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for... RRP: $153.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Exploring Blockchain in Healthcare This book aims to analyze the role of blockchain technology in healthcare and how medical tech teams can establish a digital and linked healthcare system for the modern-day. After reading this book, readers will be able to create, develop, and implement... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A Comprehensive Guide to Investing in Cryptocurrency A cryptocurrency is a form of payment that can be exchanged online. Cryptocurrencies work using a technology called a blockchain.It is a collection of binary data which is designed to work as a medium of exchange wherein individual coin ownership records... RRP: $44.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Hidden Corporation If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information... RRP: $41.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secret Colors Secret Colors is a gentle introduction to cryptography. With hand-drawn imagery and gentle explanations of cryptography concepts, this book will captivate beginners of all ages and backgrounds. The annual autumn dance is being held in the forest,... RRP: $41.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Convergence Security Convergence security can be defined as the security created by merging the physical and information security or the combining security with other non-IT technologies. Convergence Security Journal is an open access journal dedicated to the publication and... RRP: $55.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Super Secreto - The Third Epoch of Cryptography The global crisis of Privacy in the 21st century also includes discussions about the right to encryption and restrictions on so-called end-to-end encryption. In order to communicate confidentially and secure against eavesdropping, simple and practical... RRP: $69.00 Add to Cart The item has been added