Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Showing 216 - 240 (of 501)
Refine
The Official (ISC)2 Guide to the CCSP CBK - Book

The Official (ISC)2 Guide to the CCSP CBK

Adam Gordon

Format: Book (Hardback)

£65.00

£55.55

Book (Hardback)

Item not Available
Solving Cyber Risk : Protecting Your Company and Society - Book

£37.99

£26.05

Book (Hardback)

Add to Basket
Noiseless Steganography : The Key to Covert Communications - Book

£120.00

Book (Hardback)

Add to Basket
Secure Computer and Network Systems : Modeling, Analysis and Design - Book

Secure Computer and Network Systems : Modeling, Analysis and Design

Nong (Arizona State University, USA) Ye

Format: Book (Hardback)

£115.95

Book (Hardback)

Add to Basket
Defeating the Hacker : A Non-technical Guide to Computer Security - Book

£18.99

£14.15

Book (Hardback)

Item not Available
Security of Multimedia Content : Technical Solutions, Legislation and Business Models - Book

£60.00

£51.39

Book (Hardback)

Item not Available
Security Engineering : A Guide to Building Dependable Distributed Systems - Book

£65.00

£55.45

Book (Hardback)

Item not Available
Modern Cryptanalysis : Techniques for Advanced Code Breaking - Book

£42.50

£28.45

Book (Hardback)

Item not Available
Hardware-based Computer Security Techniques to Defeat Hackers : From Biometrics to Quantum Cryptography - Book

Hardware-based Computer Security Techniques to Defeat Hackers : From Biometrics to Quantum Cryptography

Roger R. (Digital Authentication, Inc.) Dube

Format: Book (Hardback)

£110.95

Book (Hardback)

Add to Basket
Hashing in Computer Science : Fifty Years of Slicing and Dicing - Book

Hashing in Computer Science : Fifty Years of Slicing and Dicing

Alan G. (IBM, Thomas J. Watson Research Center) Konheim

Format: Book (Hardback)

£132.95

Book (Hardback)

Add to Basket
Myths Vs. Facts Of Cryptocurrency - Book

Myths Vs. Facts Of Cryptocurrency

Alex Caine

Format: Book (Hardback)

£18.99

Book (Hardback)

Add to Basket
Luck Follows the Brave : From Refugee Camps, Abuse, and Suicide Loss to Living the Dream - Book

£23.95

£20.95

Book (Hardback)

Add to Basket
The International Handbook of Computer Security - Book

The International Handbook of Computer Security

Jae Shim

Format: Book (Hardback)

£150.00

Book (Hardback)

Add to Basket
Secure Messaging with PGP and S/MIME - Book

Secure Messaging with PGP and S/MIME

Rolf Oppliger

Format: Book (Hardback)

£87.00

£66.45

Book (Hardback)

Item not Available
Trusted Computing : Principles and Applications - Book

Trusted Computing : Principles and Applications

Dengguo Feng

Format: Book (Hardback)

£114.50

£108.69

Book (Hardback)

Add to Basket
Color Image Watermarking : Algorithms and Technologies - Book

£114.50

£108.69

Book (Hardback)

Add to Basket
Distributed Denial of Service Attacks : Concepts, Mathematical and Cryptographic Solutions - Book

£141.50

£133.89

Book (Hardback)

Add to Basket
New Research on the Voynich Manuscript : Proceedings of a Seminar - Book

£14.99

Book (Hardback)

Add to Basket
Technical Articles about the Voynich Manuscript - Book

£16.99

Book (Hardback)

Add to Basket
Encryption for Digital Content - Book

Encryption for Digital Content

Aggelos Kiayias

Format: Book (Hardback)

£119.99

£103.69

Book (Hardback)

Item not Available
Adaptive Cryptographic Access Control - Book

Adaptive Cryptographic Access Control

Anne V. D. M. Kayem

Format: Book (Hardback)

£92.00

£74.55

Book (Hardback)

Item not Available
Information Security Policies and Actions in Modern Integrated Systems - Book

£63.96

Book (Hardback)

Add to Basket
Showing 216 - 240 (of 501)
Refine