"The book focuses on the recent advances and challenges related to the concerns of security and privacy issues in deep l......more
Introducing the "Trojan Exposed" Book Bundle: Your Ultimate Defense Against Cyber Threats! ����️ Are you concerned about......more
Unlock the Power of Network Security with the NMAP Network Scanning Series! Welcome to the Network Security, Monitoring,......more
���� Wireless Exploits and Countermeasures Book Bundle ���� Unveil the Secrets of Wireless Security with Our Comprehensi......more
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assuran......more
Unlock the Power of Advanced OSINT Strategies Welcome to the "Advanced OSINT Strategies" book bundle - your ultimate gui......more
This book constitutes the refereed proceedings of the 8th International Conference on Internet on Things, ICIOT 2023, he......more
Get started with Microsoft Intune and explore its many facets, including task automation with Microsoft GraphKey Feature......more
...more
This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice......more
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced,......more
This book demonstrates how information security requires a deep understanding of an organization’s assets, threats and p......more
Every major technical invention resurfaces the dual-use dilemma - the new technology has the potential to be used for go......more
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizin......more
Introducing the Ultimate Ethical Hacking Book Bundle: "PENTESTING 101: CRACKING GADGETS AND HACKING SOFTWARE" Are you re......more
Introducing the "OSINT Hacker’s Arsenal" Book Bundle! Unlock the Power of Open Source Intelligence (OSINT) with our comp......more
���� Explore the Future with the "Quantum Computing: Computer Science, Physics, and Mathematics" Book Bundle! ���� Are y......more
This book presents the concept of cryptcoding which arises from the need to obtain secure and accurate transmission. The......more
Machine Learning Theory and Applications Enables readers to understand mathematical concepts behind data engineering and......more
...more
���� Discover the Ultimate Web Application Security Book Bundle: OWASP Top 10 Vulnerabilities Are you ready to fortify y......more
This book discusses understand cybersecurity management in decentralized finance (DeFi). It commences with introducing f......more
���� Quantum Physics Voyage - Uncover the Secrets of the Quantum Universe! Are you fascinated by the mysteries of the qu......more
Secure your Azure applications the right way. The expert DevSecOps techniques you’ll learn in this essential handbook ma......more
"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data ......more
"Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framewor......more
���� Introducing the "Kali Linux CLI Boss" Book Bundle: From Novice to Command Line Maestro ���� Are you ready to master......more
����️]♂️ OSINT COMMANDO Book Bundle ���� Are you ready to unlock the secrets of the digital world and become a master of......more
Empower Your Digital Shield with Splunk Expertise! Book Description The Ultimate Splunk for Cybersecurity is your practi......more
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concret......more
This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, he......more
This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cr......more
Blockchain technology (BT) is quietly transforming the world, from financial infrastructure, to the internet-of-things,......more
Deals with collaborative security, a newly developing and promising field. Describes generic techniques as well as their......more
Introducing the "OSINT Cracking Tools" Book Bundle Unlock the Power of OSINT with Four Comprehensive Guides Are you read......more
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a tas......more
This book explores the connections between qualitative data reuse, big social research, and data curation. A review of e......more
Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle! Are you concerned about the growing threats in the d......more
The book constitutes proceedings of the 12th Industry Symposium held in conjunction with the 18th edition of the Interna......more
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to ope......more
Unlock the Secrets of Malware with "Malware Reverse Engineering: Cracking the Code" - Your Comprehensive Guide to Cybers......more
...more
If you want to learn more about cutting edge quantum technology, read "The Revolution in Quantum Technology: How Game-Ch......more
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Ma......more
Build cloud infrastructure expertise by elevating your Azure admin skills, mastering core services, and boosting product......more
This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Secu......more
Implement industry best practices to identify vulnerabilities and protect your data, models, environment, and applicatio......more
The book deals with the effective operation of the rules related to biomedical research and pays attention to the activi......more
In the computerized age, QR codes have become pervasive, consistently coordinated into our regular routines. From item m......more
...more
...more
An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers Take the 2023 version of ......more
Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline......more
Biometrics use an individual’s unique biological identifiers to verify his or her identity. The present technological ev......more
This book is a concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures....more
Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware atta......more
Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author ......more
The introduction of revolutionary blockchain technology has brought about a paradigm shift in the finance industry, ushe......more
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Info......more
PRIVACY PRESERVATION of GENOMIC and MEDICAL DATA Discusses topics concerning the privacy preservation of genomic data in......more
AUTOMATED SECURE COMPUTING FOR NEXT-GENERATION SYSTEMS This book provides cutting-edge chapters on machine-empowered sol......more
Binance, a global cryptocurrency exchange platform, has emerged as a transformative force in the ever-evolving landscape......more
���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! �......more
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificia......more
In this second edition, the concepts of Microsoft Azure are discussed. How Microsoft is playing a huge role in Artificia......more
This book presents an overview of the recent advances in blockchain technology which have led to new breakthroughs in th......more
"The book examines the current state of DeFi, insofar as the aims of creating a more efficient, interoperable and inclus......more
This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, ver......more
...more
This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to g......more
This book presents the best papers from the 4th International Conference on Mathematical Research for Blockchain Economy......more
Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international complianc......more
In 2016, during its merger with Verizon, Yahoo reported improperly resolved previous cyber incidents, which resulted in ......more
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Info......more
This book is designed for data scientists, machine learning practitioners, and anyone with a foundational understanding ......more
A penetrating look at the dark side of emerging AI technologies In The Language of Deception: Weaponizing Next Generatio......more
Every day, thousands of cyberattacks target businesses worldwide. Sooner or later, hackers will infiltrate your systems,......more
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICIS......more
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization’s cy......more
This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabiliti......more
"Demystifying DevSecOps in AWS" is a practical and insightful handbook designed to empower you in your pursuit of securi......more
This book presents Industry 4.0 enabler technologies and tools. It also highlights some of the existing empirical applic......more
During the Global Financial Crisis in 2008, our financial infrastructure failed. Governments bailed out the very institu......more
Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commission......more
Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commission......more
This book constitutes the revised selected papers from the workshops affiliated with the 27th International Conference ......more
This book takes readers through the sensational history of blockchains and their potential to revolutionize database sys......more
���� Navigating the Tech Revolution: Your Comprehensive Guide Step into the future of technology with a book that covers......more
...more
The explosive growth of bioeconomy and bioscience, coupled with an interconnected planet increases the potential impact ......more
This book has unique features that set it apart from conventional books on the prevention of system failures in that it ......more
As statistics become additional rife in society, the analysis space is antic- ipated to deal with an ever widening field......more
The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Fi......more
The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Fi......more
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to ope......more
This book introduces readers to the fundamentals of and recent advances in federated learning, focusing on reducing comm......more
���� The Ultimate Guide to System Design Looking to master the art of system design? Dive into this comprehensive guide ......more