All CategoriesComputers & Technology → Security & Encryption

Listing 86 Free Ebooks at Amazon

Book Avg Rating Num Ratings Last Verified
Ganar Dinero Online en 7 Dìas: Cómo ganar dinero en Internet y crear alquileres automáticos con la Web (Spanish Edition) by Giacomo Bruno 0.0 0 May 28
Sicurezza informatica. 10 cose da non fare mai (Italian Edition) by Zonin Renzo and Bonanomi Gianluigi 0.0 0 May 27
Rapporto Censis Deepcyber - Il valore della cybersecurity: Perché serve la sicurezza informatica per la buona rivoluzione digitale (Italian Edition) by Censis and Deepcyber 0.0 0 May 27
Understanding The Metaverse: The Beginners Guide to Virtual Reality, Investing in the Web 3.0 world, NFTs, and the rest of it! by Bernard Young and JH Publications 0.0 0 May 27
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ... Notes in Computer Science Boo by Lujo Bauer and Ralf Küsters 0.0 0 May 27
Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, ... Computer and Information Science Boo by Erol Gelenbe, Paolo Campegiani 0.0 0 May 27
Managing Risk and Information Security: Protect to Enable by Malcolm W. Harkins 0.0 0 May 27
Symbiotic Interaction: 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29–30, 2016, Revised Selected Papers (Lecture Notes in Computer Science Book 9961) by Luciano Gamberini, Anna Spagnolli 0.0 0 May 27
The Coupling of Safety and Security: Exploring Interrelations in Theory and Practice (SpringerBriefs in Applied Sciences and Technology) by Corinne Bieder and Kenneth Pettersen Gould 0.0 0 May 27
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security) by William Futral and James Greene 0.0 0 May 27
Managing Risk and Information Security: Protect to Enable (Expert's Voice in Information Technology) by Malcolm Harkins 0.0 0 May 27
Security Infrastructure Technology for Integrated Utilization of Big Data: Applied to the Living Safety and Medical Fields by Atsuko Miyaji and Tomoaki Mimoto 0.0 0 May 27
Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers (Communications in Computer and Information Science Book 970) by Xiaochun Yun, Weiping Wen 0.0 0 May 27
Data Privacy for the Smart Grid by Rebecca Herold and Christine Hertzog 0.0 0 May 27
Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Communications in Computer and Information Science Book 1299) by Wei Lu, Qiaoyan Wen 0.0 0 May 27
Co-governed Sovereignty Network: Legal Basis and Its Prototype & Applications with MIN Architecture by Hui Li and Xin Yang 0.0 0 May 27
Cyber Security: 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers (Communications in Computer and Information Science Book 1506) by Wei Lu, Yuqing Zhang 0.0 0 May 27
Modern Socio-Technical Perspectives on Privacy by Bart P. Knijnenburg, Xinru Page 0.0 0 May 27
Electronic Voting: 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings (Lecture Notes in Computer Science Book 13553) by Robert Krimmer, Melanie Volkamer 0.0 0 May 27
GDPR and Biobanking: Individual Rights, Public Interest and Research Regulation across Europe (Law, Governance and Technology Series Book 43) by Santa Slokenberga, Olga Tzortzatou 0.0 0 May 27
Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling by Julius Holderer 0.0 0 May 27
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, ... Notes in Computer Science Bo by Daphne Tuncer, Robert Koch 0.0 0 May 27
Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy Book 164) by Kim J. Andreasson 0.0 0 May 27
Handbook of Vascular Biometrics (Advances in Computer Vision and Pattern Recognition) by Andreas Uhl, Christoph Busch 0.0 0 May 27
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine by Xiaoyu Ruan 0.0 0 May 27
Sort by: Avg Rating | Num Ratings | Last Verified
Avg 0.0 of 0 ratings - Last Verified May 27
Avg 0.0 of 0 ratings - Last Verified May 27
Avg 0.0 of 0 ratings - Last Verified May 27
Avg 0.0 of 0 ratings - Last Verified May 27
Avg 0.0 of 0 ratings - Last Verified May 27
Data Privacy for the Smart Grid by Rebecca Herold and Christine Hertzog
Avg 0.0 of 0 ratings - Last Verified May 27
Avg 0.0 of 0 ratings - Last Verified May 27
Modern Socio-Technical Perspectives on Privacy by Bart P. Knijnenburg, Xinru Page
Avg 0.0 of 0 ratings - Last Verified May 27
Avg 0.0 of 0 ratings - Last Verified May 27
Avg 0.0 of 0 ratings - Last Verified May 27