Games
Apps
Books
Kids
google_logo Play
Games
Apps
Books
Kids
none
search
help_outline
Sign in with Google
play_apps
Library & devices
payment
Payments & subscriptions
reviews
My Play activity
redeem
Offers
Play Pass
Personalization in Play
settings
Settings
Privacy Policy
•
Terms of Service
Games
Apps
Books
Kids
Similar ebooks
Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II
Book 336
€54.49
€38.14
Electronic Healthcare: First International Conference, eHealth 2008, London, September 8-9, 2008, Revised Selected Papers
Book 1
€54.49
€38.14
Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings
€51.22
€35.85
Mastering Ethereum: Building Smart Contracts and DApps
€41.41
Preserving Privacy in Data Outsourcing
Book 99
€98.09
€68.66
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
€35.96
€25.17
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
€14.78
Secure Voice Processing Systems against Malicious Voice Attacks
€54.49
€38.14
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
€17.99
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings
€54.49
€38.14
Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings
€54.49
€38.14
Blockchain: Blueprint for a New Economy
€21.80
Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings
€54.49
€38.14
|| BTC MINING || how to properly mime for BItcoin || MR. BIG WEALTH
€0
Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
€51.22
€35.85
The NFT Handbook: How to Create, Sell and Buy Non-Fungible Tokens
€16.99
Applied Cryptography: Protocols, Algorithms and Source Code in C, Edition 2
€47.99
AI Embedded Assurance for Cyber Systems
€152.59
€106.81
Dark Territory: The Secret History of Cyber War
€17.88
Computer Security -- ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings
€54.49
€38.14