Title: Foreign Information Manipulation and Interference: Case Studies From the ATHENA Project, Author: David Wright
Title: Quantum Unmanned Aerial Vehicle: Achieving Cybersecurity and AI Strategies, Author: Hemant Kumar Saini
Title: Unleashing the Power of Blockchain and IoT for Water Informatics, Author: Sur Singh Rawat
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Sustainable Blind Quantum Computing, Author: Srinjoy Ganguly
Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: Mastering Deepfake Technology: Strategies for Ethical Management and Security, Author: Sanjay Taneja
Title: Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III, Author: Marc Fischlin
Title: Cyber Security and Digital Forensics: Select Proceedings of the 2nd International Conference, ReDCySec 2024, Author: Nihar Ranjan Roy
Title: Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms, Author: Amit Kumar Tyagi
Title: Innovative Security Solutions for Information Technology and Communications: 17th International Conference, SecITC 2024, Bucharest, Romania, November 21-22, 2024, Revised Selected Papers, Author: Luciana Morogan
Title: Information Systems Security and Privacy: 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22-24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26-28, 2024, Revised Selected Papers, Author: Gabriele Lenzini
Title: Cybersecurity in Knowledge Management: Cyberthreats and Solutions, Author: Narasimha Rao Vajjhala
Title: Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare, Author: Prateek Singhal
Title: Metaverse Platform Implementation: AI, Security, and Applications, Author: Fei Hu
Title: Secure Online Voting Using Biometric Authentication and Public Key Encryption, Author: Ajish S
Title: Cyber Security, Forensics and National Security, Author: Vinay Aseri
Title: Mobile Penetration Testing: A Hands-On Approach, Author: Sabyasachi Paul
Title: From Street-smart to Web-wise®: A Cyber Safety Training Program Built for Teachers and Designed for Children (Book 4), Author: Al Marcella
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Explore Series

Pagination Links