Skip to main content
Toggle navigation
Contact Us
Log in
For Authors
Category
Arts & Photography
Biographies & Memoirs
Business & Money
Children's eBooks
Comics, Manga & Graphic Novels
Computers & Technology
Cookbooks, Food & Wine
Crafts, Hobbies & Home
Education & Teaching
Engineering & Transportation
Foreign Languages
Health, Fitness & Dieting
History
Humor & Entertainment
Law
LGBTQ+ eBooks
Literature & Fiction
Medical eBooks
Mystery, Thriller & Suspense
Nonfiction
Parenting & Relationships
Politics & Social Sciences
Reference
Religion & Spirituality
Romance
Science & Math
Science Fiction & Fantasy
Self-Help
Sports & Outdoors
Teen & Young Adult
Travel
Search
Security & Encryption
Categories
All categories
Computers & Technology
Security & Encryption
Encryption
Networking
Online Safety & Piracy
Viruses & Malware
Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, ... Computer and Information Science Book 821)
Data Privacy for the Smart Grid
Rebecca Herold, Christine Hertzog
How to Hack a Human: A Brief Introduction
Raef Meeuwisse
Tracer: A gripping thriller full of intrigue and suspense (Korso Thrillers Book 1)
Jason Dean
Information Security Governance Simplified: From the Boardroom to the Keyboard
Todd Fitzgerald
Unauthorized Access: The Crisis in Online Privacy and Security
Robert Sloan, Richard Warner
A Simpler Guide to Online Security for Everyone: How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for ... and other Google services (Simpler Guides)
Ceri Clark
Sicurezza informatica. 10 cose da non fare mai (Italian Edition)
Zonin Renzo, Bonanomi Gianluigi
Multimedia Forensics (Advances in Computer Vision and Pattern Recognition)
Husrev Taha Sencar, Luisa Verdoliva, Nasir Memon
Cyber Security: 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers (Communications in Computer and Information Science Book 1506)
Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Advances in Computer Vision and Pattern Recognition)
Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch
The Future of Financial Systems in the Digital Age: Perspectives from Europe and Japan (Perspectives in Law, Business and Innovation)
Markus Heckel, Franz Waldenberger
Cybersecurity of Digital Service Chains: Challenges, Methodologies, and Tools (Lecture Notes in Computer Science Book 13300)
Joanna Kołodziej, Matteo Repetto, Armend Duzha
Modern Socio-Technical Perspectives on Privacy
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano
Challenges in Cybersecurity and Privacy - the European Research Landscape
Jorge Bernal Bernabe, Antonio Skarmeta
Data Spaces: Design, Deployment and Future Directions
Edward Curry, Simon Scerri, Tuomo Tuikka
Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings (Lecture Notes in Computer Science Book 13553)
Robert Krimmer, Melanie Volkamer, David Duenas-Cid, Peter Rønne, Micha Germann
Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling
Julius Holderer
Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected Papers ... Computer and Information Science Book 1596)
Erol Gelenbe, Marija Jankovic, Dionysios Kehagias, Anna Marton, Andras Vilmos
Buy Bitcoin, You'll Thank Yourself In The Future: A book about Bitcoin by BBCD Satoshi
BBCD Satoshi
Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers (Communications in Computer and Information Science Book 1699)
Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li
Advanced Digital Auditing: Theory and Practice of Auditing Complex Information Systems and Technologies (Progress in IS)
Egon Berghout, Rob Fijneman, Lennard Hendriks, Mona de Boer, Bert-Jan Butijn
Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual Event, August 17–19, 2022, Revised Selected Papers (Communications in Computer and Information Science Book 1683)
Luis Bathen, Gokay Saldamli, Xiaoyan Sun, Thomas H. Austin, Alex J. Nelson
Archives and Records: Privacy, Personality Rights, and Access
Mikuláš Čtvrtník
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao
Information Security Governance Simplified: From the Boardroom to the Keyboard
Todd Fitzgerald
Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability (Palgrave Studies in Digital Business & Enabling Technologies)
Theo Lynn, John G. Mooney, Lisa van der Werff, Grace Fox
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
Data Privacy for the Smart Grid
Rebecca Herold, Christine Hertzog
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Jesse Varsalone, Matthew McFadden
The InfoSec Handbook: An Introduction to Information Security
Umesha Nayak, Umesh Hodeghatta Rao
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
William Futral, James Greene
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ... Notes in Computer Science Book 10804)
Lujo Bauer, Ralf Küsters
Handbook of Vascular Biometrics (Advances in Computer Vision and Pattern Recognition)
Andreas Uhl, Christoph Busch, Sébastien Marcel, Raymond Veldhuis
International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019 (Mathematics for Industry Book 33)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Yasuhiko Ikematsu
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, ... Notes in Computer Science Book 10356)
Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller
The Ethics of Cybersecurity (The International Library of Ethics, Law and Technology Book 21)
Markus Christen, Bert Gordijn, Michele Loi
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Raghuram Yeluri, Enrique Castro-Leon
Online Safety: Scams, SPAM, Viruses and Clouds (Cyber Security Community Book 1)
A. M. Perry
1
2
next ›
last »
Featured Books
Carpe DiEmily (Part 1)
Riley J. Ford
Romance: Simone: Adventures in Dating (Book 1: The Billionaire) (Simone Series)
Riley J. Ford
The Fifth Vital: A Prelude
Mike Majlak, Riley J. Ford
Free Books For Free
is an author-approved catalog of all the free Ebooks on Amazon. Start reading on your Kindle or tablet now!
Popular Books
The Reminiscences of an Astronomer
Simon Newcomb
Without Warning! 2 (Tsunami)
Jeremy Barlow
Henry IV, Makers of History
John S. C. (John Stevens Cabot) Abbott
Mindfield #0 (Mindfield Vol. 1)
J.T. Krul