Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Are you fascinated by the buzz surrounding crypto, but feeling a little overwhelmed, and don't know how to get started? Are you looking to make money ...Savoir plus
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during No...Savoir plus
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks often aim to access, change, or destro...Savoir plus
Tired of being spied on? Want a discounted price on THREE different eBooks that show you how to defeat state, isp and nsa spying on you? This package ...Savoir plus
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 20...Savoir plus
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arli...Savoir plus
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TL...Savoir plus
Learn the most powerful and primary programming language for writing smart contracts and find out how to write, deploy, and test smart contracts in Et...Savoir plus
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in Africa, AFRICACRYPT 2024, held in Douala, Cameroo...Savoir plus
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42 nd Annual International Conference on Theory and Applications ...Savoir plus
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale,...Savoir plus
As a teenager in Bosnia, Aida Šibić witnesses the horrors of war. She and her family leave loved ones behind as they flee religious persecution and ...Savoir plus
Myths Vs. Facts Of Cryptocurrency - A Beginner's Guide To Understanding Cryptocurrencies & Blockchain Technology The birth of Bitcoin in 2009 gave ris...Savoir plus
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis...Savoir plus
This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in S...Savoir plus
This textbook is a concise introduction to the basic toolbox of structures that allow efficient organization and retrieval of data, key algorithms for...Savoir plus
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presen...Savoir plus
This book discusses the state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this to...Savoir plus
This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation and deployment, and provides a step-b...Savoir plus
Unlock the Future of Finance with "Investing in Crypto: Is The Digital Gold Rush Over?" Are you ready to dive into the thrilling world of cryptocurren...Savoir plus
Do you want to learn how to the art of hacking in as little time as possible? Hacking and the field of Cybersecurity are one of the fastest-growing jo...Savoir plus
Time-Based One-Time Passwords (TOTP) add an extra level of security around your vital electronic data. Traditional passwords once provided a reasonabl...Savoir plus
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication network...Savoir plus
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cry...Savoir plus