Title: Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part I, Author: Sanjay Goel
Title: Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II, Author: Sanjay Goel
Title: Foundations of Computer Science and Frontiers in Education: Computer Science and Computer Engineering: 20th International Conference, FCS 2024, and 20th International Conference, FECS 2024, Held as Part of the World Congress in Computer Science, Computer, Author: Hamid R. Arabnia
Title: Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part I, Author: Sanjay Goel
Title: Federated Cyber Intelligence: Federated Learning for Cybersecurity, Author: Hamed Tabrizchi
Title: Code-Based Cryptography: 12th International Workshop, CBCrypto 2024, Zurich, Switzerland, May 25-26, 2024, Revised Selected Papers, Author: Violetta Weger
Title: Digital Forensics and Cyber Crime: 15th EAI International Conference, ICDF2C 2024, Dubrovnik, Croatia, October 9-10, 2024, Proceedings, Part II, Author: Sanjay Goel
Title: The Confluence of Cryptography, Blockchain and Artificial Intelligence, Author: Ankita Sharma
Title: Cybersecurity in Knowledge Management: Cyberthreats and Solutions, Author: Narasimha Rao Vajjhala
Title: The Confluence of Cryptography, Blockchain and Artificial Intelligence, Author: Ankita Sharma
Title: Computational Intelligence, Cyber Security and Computational Models. Emerging Trends in Computational Models, Intelligence and Security Systems: 6th International Conference, ICC3 2023, Coimbatore, India, December 14-16, 2023, Revised Selected Papers, Author: Shina Sheen
Title: Risks and Security of Internet and Systems: 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings, Author: Simon Collart-Dutilleul
Title: Cryptography: A Very Short Introduction, Author: Sean Murphy
Title: Safeguarding 6G: Security and Privacy for the Next Generation, Author: Ramjee Prasad
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Ransom War: How Cyber Crime Became a Threat to National Security
by Max Smeets
Narrated by  Walter Dixon
Audiobook (Unabridged) $19.99
. Price is $19.99 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part IV, Author: Serge Fehr
Title: Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4-8, 2025, Proceedings, Part I, Author: Serge Fehr
Title: Safeguarding 6G: Security and Privacy for the Next Generation, Author: Ramjee Prasad
Title: Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III, Author: Serge Fehr

Pagination Links