Why CISOs Fail 2e and The Security Hippie Set
Barak Engel
Out of stock
Format: Book (Multiple-component retail product)
Why CISOs Fail 2e and The Security Hippie Set
Barak Engel
Out of stock
Format: Book (Multiple-component retail product)
Controlling Privacy and the Use of Data Assets Set
Ulf Mattsson
Pre-Order
Format: Book (Multiple-component retail product)
Digital Transformation in Healthcare 5.0 : Volume 1: IoT, AI and Digital Twin
Rishabha Malviya
Download - Immediately Available
Format: eBook (PDF)
Hello World : How to be Human in the Age of the Machine
Hannah Fry
Download - Immediately Available
Format: eBook (EPUB)
Internet Password Keeper
Eric Butow
In Stock - usually despatched within 24 hours
Format: Book (Record book)
Information Security : Policy, Processes, and Practices
Seymour Goodman
Download - Immediately Available
Format: eBook (EPUB)
Secure, Resilient, and Agile Software Development
Mark Merkow
Download - Immediately Available
Format: eBook (EPUB)
Human Dimensions of Cybersecurity
Terry (Charles Sturt University, Bathurst, Australia) Bossomaier
Download - Immediately Available
Format: eBook (PDF)
Guide to the De-Identification of Personal Health Information
Khaled El Emam
Download - Immediately Available
Format: eBook (PDF)
Balancing Privacy and Free Speech : Unwanted Attention in the Age of Social Media
Mark Tunick
Download - Immediately Available
Format: eBook (EPUB)
Secure, Resilient, and Agile Software Development
Mark Merkow
Download - Immediately Available
Format: eBook (PDF)
An In-Depth Guide to Mobile Device Forensics
Chuck Easttom
Download - Immediately Available
Format: eBook (PDF)
Blockchain Technology : Fundamentals, Applications, and Case Studies
E. Golden Julie
Download - Immediately Available
Format: eBook (PDF)
Someone's Watching You! : From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It
Forest Lee
Download - Immediately Available
Format: eBook (EPUB)
Securing Systems : Applied Security Architecture and Threat Models
Brook S. E. Schoenfield
Download - Immediately Available
Format: eBook (PDF)
Behavioral Cybersecurity : Fundamental Principles and Applications of Personality Psychology
Wayne (Wayne Patterson, Patterson and Associates) Patterson
Download - Immediately Available
Format: eBook (PDF)
Online Social Networks Security : Principles, Algorithm, Applications, and Perspectives
Brij B. (National Institute of Technology Kurukshetra, India) Gupta
Download - Immediately Available
Format: eBook (PDF)
Controlling Privacy and the Use of Data Assets, Volume 1 and 2
Ulf Mattsson
Out of stock
Format: Book (Multiple-component retail product)
Controlling Privacy and the Use of Data Assets, Volume 1 and 2
Ulf Mattsson
Out of stock
Format: Book (Multiple-component retail product)
Controlling Privacy and the Use of Data Assets - Volume 2 : What is the New World Currency - Data or Trust?
Ulf Mattsson
Download - Immediately Available
Format: eBook (PDF)
Controlling Privacy and the Use of Data Assets - Volume 2 : What is the New World Currency - Data or Trust?
Ulf Mattsson
Download - Immediately Available
Format: eBook (EPUB)
Cyber Resilience in Critical Infrastructure
Sinan Kufeoglu
Download - Immediately Available
Format: eBook (PDF)