Keys to the Kingdom : Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Deviant (Member of the Board of Directors of the U.S. division Ollam
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£34.39
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketOpen Information Security Management Maturity Model O-ISM3
The Group
Download - Immediately Available
Format: eBook (PDF)
Windows Performance Analysis Field Guide
Clint (Senior Premier Field Engineer at Microsoft) Huffman
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£36.99
£32.09
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketInformation Security Risk Assessment Toolkit : Practical Assessments through Data Collection and Data Analysis
Mark (Chief Threat Scientist of Zvelo Inc) Talabis
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£27.29
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketCISSP For Dummies
Lawrence C. (Indianapolis, Indiana) Miller
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£29.99
£20.79
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketBreaking into Information Security : Crafting a Custom Career Path to Get the Job You Really Want
Josh (Senior Security Consultant, RJS Smart Security (CISSP, GIA More
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£27.99
£24.69
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketPractical Lock Picking : A Physical Penetration Tester's Training Guide
Deviant (Member of the Board of Directors of the U.S. division Ollam
Out of stock
Format: Book (Paperback / softback)
Strategies for Media Reform : International Perspectives
Jonathan A. Obar
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£35.00
£28.59
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketInformation Privacy in the Evolving Healthcare Environment
Linda Koontz
Out of stock
Format: Book (Paperback / softback)
Information Privacy in the Evolving Healthcare Environment
Linda Koontz
Download - Immediately Available
Format: eBook (EPUB)
Information Privacy in the Evolving Healthcare Environment
Linda Koontz
Download - Immediately Available
Format: eBook (PDF)
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Bryan Jeffrey Parno
Download - Immediately Available
Format: eBook (PDF)
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
Bryan Jeffrey Parno
Download - Immediately Available
Format: eBook (EPUB)
How to Cheat at Managing Information Security
Mark (Cheif Information Security Officer at Interoute) Osborne
Out of stock
Format: Book (Paperback / softback)
Social Engineering Penetration Testing : Executing Social Engineering Pen Tests, Assessments and Defense
Gavin (Professional Services Manager at RandomStorm) Watson
Out of stock
Format: Book (Paperback / softback)
Network Intrusion Analysis : Methodologies, Tools, and Techniques for Incident Analysis and Response
Joe (Joe Fichera is a Certified Computer Examiner (CCE) and m Fichera
Out of stock
Format: Book (Paperback / softback)
Ada and Beyond : Software Policies for the Department of Defense
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Cyber-Physical Attacks : A Growing Invisible Threat
George (Associate professor and senior lecturer of cyber-physi Loukas
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£34.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketPractical Oracle Security : Your Unauthorized Guide to Relational Database Security
Josh (Director, Worldwide Systems Engineering at Application Se Shaul
Out of stock
Format: Book (Paperback / softback)
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Eric (Independant network security consultant and speaker, USA) Cole
Out of stock
Format: Book (Paperback / softback)
Targeted Cyber Attacks : Multi-staged Attacks Driven by Exploits and Malware
Aditya (Aditya K. Sood, Ph.D., senior security researcher and co Sood
Out of stock
Format: Book (Paperback / softback)
Detecting and Combating Malicious Email
Julie JCH (Associate Professor and Chair of Engineering Manageme Ryan
Out of stock
Format: Book (Paperback / softback)