Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: The Computer Security Workbook: A Course Companion Resource, Author: Juan Tapiador
Title: Information Systems Security and Privacy: 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22-24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26-28, 2024, Revised Selected Papers, Author: Gabriele Lenzini
Title: Metaverse Platform Implementation: AI, Security, and Applications, Author: Fei Hu
Title: Philosophy.exe: The Techno-Philosophical Toolkit for Modern Minds, Author: Matthias Muhlert
Explore Series
Title: Foundations and Practice of Security: 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part II, Author: Kamel Adi
Title: Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare, Author: Prateek Singhal
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Innovative Security Solutions for Information Technology and Communications: 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024, Revised Selected Papers, Author: Luciana Morogan
Title: Certificate of Cloud Security Knowledge (CCSK v5) Study Guide: In-Depth Guidance and Practice, Author: Graham Thompson
Title: CompTIA Security+ (SY0-701) Certification Companion: Hands-on Preparation and Practice Guide, Author: Kodi A. Cochran
Title: From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 4), Author: Al Marcella
Title: Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms, Author: Amit Kumar Tyagi
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Advancements in Cybersecurity: Next-Generation Systems and Applications, Author: Agbotiname Lucky Imoize
Title: CompTIA CySA+ Certification Companion: Hands-on Preparation and Practice Guide, Author: Kodi A. Cochran
Title: Secure Online Voting Using Biometric Authentication and Public Key Encryption, Author: Ajish S
Title: Security Technologies for Law Enforcement Agencies, Author: Kazim Duraklar
Title: Quantum Unmanned Aerial Vehicle: Achieving Cybersecurity and AI Strategies, Author: Hemant Kumar Saini
Title: Cyber Risk Management in Practice: A Guide to Real-World Solutions, Author: Carlos Morales

Pagination Links