Add Wish List Add to Cart The item has been added Cyber Crime Investigator's Field Guide Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition... RRP: $153.95 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Role of Mining Pools in 51% Attack Prevention If you're investing in Bitcoin or other cryptocurrencies, you know that security is paramount. But did you know that mining pools play a crucial role in preventing one of the biggest security threats: the 51% attack?In "The Role of Mining Pools in 51%... RRP: $23.34 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Enterprise Level Security 2 Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its... RRP: $202.46 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Birth of Bitcoin Introducing "The Birth of Bitcoin" a fascinating and insightful exploration of the birth of the world's most revolutionary digital currency. From its humble beginnings in 2008, Bitcoin has exploded onto the global stage, challenging traditional financial... RRP: $23.34 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Legacy of Satoshi Nakamoto Are you curious about the mysterious figure behind the creation of Bitcoin? Do you want to learn about the impact of cryptocurrency on the world, and the future of this revolutionary technology? Look no further than "The Legacy of Satoshi Nakamoto."In... RRP: $23.34 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Statistical Trend Analysis of Physically Unclonable Functions Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA... RRP: $131.67 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Security Hippie The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many... RRP: $281.75 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IoT Applications, Security Threats, and Countermeasures The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog... RRP: $409.81 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to Cryptography This book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several... RRP: $149.23 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Essential Enterprise Blockchain Concepts and Applications Blockchain is a technology that has attracted the attention of all types of businesses. Cryptocurrency such as Bitcoin has gained the most attention, but now companies are applying Blockchain technology to develop solutions improving traditional... RRP: $192.71 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Cybersecurity Technologies Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human... RRP: $358.59 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added An In-Depth Guide to Mobile Device Forensics Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile... RRP: $307.36 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Practical Mathematical Cryptography This book provides a clear and accessible introduction to practical mathematical cryptography. The presentation provides a unified and consistent treatment of the most important cryptographic topics, from the initial design and analysis of basic... RRP: $133.79 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Searchable Encryption and Data Management This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements... RRP: $59.19 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Formal Analysis and Verification in Cryptography This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols. The chapters... RRP: $435.42 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Defense Mechanisms This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. RRP: $120.41 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Behavioral Cybersecurity This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of... RRP: $148.98 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptanalytic Attacks on RSA RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks... RRP: $219.36 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Recent Trends in Blockchain for Information Systems Security and Privacy Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social... RRP: $272.27 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Smart Computing Technologies in Cybersecurity and Forensics This book addresses the topics related to artificial intelligence, the Internet of Things, blockchain technology, and machine learning. It brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics. The... RRP: $251.25 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Group Communications Over Data Networks The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri... RRP: $249.48 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy in the Age of Ubiquitous Computing Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P ... RRP: $334.16 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Multimedia Encryption and Watermarking Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital... RRP: $323.20 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Managing Information Risk and the Economics of Security Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the... RRP: $334.16 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptographic Engineering This book is for engineers and researchers working in the embedded hardware industry. This book addresses the design aspects of cryptographic hardware and embedded software. The authors provide tutorial-type... RRP: $491.95 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Official Bitcoin Coloring Book The long awaited volume from Satoshi Nakamoto, renowned polymath and creator of Bitcoin is finally here! Printed on a brilliant white paper, The Official Bitcoin Coloring Book* is packed with unique, right-brain insights into this revolutionary digital... RRP: $23.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added The Year in Tech, 2021: The Insights You Need from Harvard Business Review A year of HBR's essential thinking on tech - all in one place. From the latest applications of AI to blockchain-enabled business models to 5G networks, the most important technological innovations of the past year are reshaping the present and... RRP: $34.99 $34.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Mathematics of Secrets Explaining the mathematics of cryptographyThe Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples,... RRP: $34.99 $34.00 Add to Cart The item has been added