Digital Transformation in Healthcare 5.0 : Volume 1: IoT, AI and Digital Twin
Rishabha Malviya
Download - Immediately Available
Format: eBook (PDF)
Hello World : How to be Human in the Age of the Machine
Hannah Fry
Download - Immediately Available
Format: eBook (EPUB)
Internet Password Keeper
Eric Butow
In Stock - usually despatched within 24 hours
Format: Book (Record book)
Secure, Resilient, and Agile Software Development
Mark Merkow
Download - Immediately Available
Format: eBook (EPUB)
Information Security : Policy, Processes, and Practices
Seymour Goodman
Download - Immediately Available
Format: eBook (EPUB)
Human Dimensions of Cybersecurity
Terry (Charles Sturt University, Bathurst, Australia) Bossomaier
Download - Immediately Available
Format: eBook (PDF)
Guide to the De-Identification of Personal Health Information
Khaled El Emam
Download - Immediately Available
Format: eBook (PDF)
Secure, Resilient, and Agile Software Development
Mark Merkow
Download - Immediately Available
Format: eBook (PDF)
An In-Depth Guide to Mobile Device Forensics
Chuck Easttom
Download - Immediately Available
Format: eBook (PDF)
Blockchain Technology : Fundamentals, Applications, and Case Studies
E. Golden Julie
Download - Immediately Available
Format: eBook (PDF)
Behavioral Cybersecurity : Fundamental Principles and Applications of Personality Psychology
Wayne (Wayne Patterson, Patterson and Associates) Patterson
Download - Immediately Available
Format: eBook (PDF)
Balancing Privacy and Free Speech : Unwanted Attention in the Age of Social Media
Mark Tunick
Download - Immediately Available
Format: eBook (EPUB)
Online Social Networks Security : Principles, Algorithm, Applications, and Perspectives
Brij B. (National Institute of Technology Kurukshetra, India) Gupta
Download - Immediately Available
Format: eBook (PDF)
Securing Systems : Applied Security Architecture and Threat Models
Brook S. E. Schoenfield
Download - Immediately Available
Format: eBook (PDF)
Someone's Watching You! : From Micropchips in your Underwear to Satellites Monitoring Your Every Move, Find Out Who's Tracking You and What You Can Do about It
Forest Lee
Download - Immediately Available
Format: eBook (EPUB)
Controlling Privacy and the Use of Data Assets - Volume 2 : What is the New World Currency - Data or Trust?
Ulf Mattsson
Download - Immediately Available
Format: eBook (PDF)
Controlling Privacy and the Use of Data Assets - Volume 2 : What is the New World Currency - Data or Trust?
Ulf Mattsson
Download - Immediately Available
Format: eBook (EPUB)
Cyber Resilience in Critical Infrastructure
Sinan Kufeoglu
Download - Immediately Available
Format: eBook (PDF)
Cyber Resilience in Critical Infrastructure
Sinan Kufeoglu
Download - Immediately Available
Format: eBook (EPUB)
Information Security Policies, Procedures, and Standards : Guidelines for Effective Information Security Management
Thomas R. (Thomas R. Peltier Associates, LLC, Wyandotte, Mich Peltier
Download - Immediately Available
Format: eBook (PDF)
A Beginner’s Guide to Internet of Things Security : Attacks, Applications, Authentication, and Fundamentals
Brij B. (Director, International Center for AI & CCRI) Gupta
Download - Immediately Available
Format: eBook (PDF)
A Beginner’s Guide to Internet of Things Security : Attacks, Applications, Authentication, and Fundamentals
Brij B. (Director, International Center for AI & CCRI) Gupta
Download - Immediately Available
Format: eBook (EPUB)
Big Data Analytics and Computing for Digital Forensic Investigations
Suneeta (CE Bhubaneswar) Satpathy
Download - Immediately Available
Format: eBook (PDF)