Enterprise Security Architecture : A Business-Driven Approach
Nicholas Sherwood
Download - Immediately Available
Format: eBook (EPUB)
Enterprise Security Architecture : A Business-Driven Approach
Nicholas Sherwood
Download - Immediately Available
Format: eBook (PDF)
PRAGMATIC Security Metrics : Applying Metametrics to Information Security
W. Krag, CISM (Enterprise Security Architect, Thousand Oaks, C Brotby
Download - Immediately Available
Format: eBook (PDF)
Complete Guide to CISM Certification
Thomas R. (Thomas R. Peltier Associates, LLC, Wyandotte, Mich Peltier
Download - Immediately Available
Format: eBook (PDF)
Cryptography : Theory and Practice
Douglas Robert (University of Waterloo, Ontario, Canada) Stinson
Download - Immediately Available
Format: eBook (PDF)
At Large : The Strange Case of the World's Biggest Internet Invasion
Charles C. Mann
Download - Immediately Available
Format: eBook (EPUB)
Cyber Forensics : A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Jr., Albert Marcella
Download - Immediately Available
Format: eBook (PDF)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
Practical Cryptography : Algorithms and Implementations Using C++
Saiful Azad
Download - Immediately Available
Format: eBook (PDF)
Ultimate Web Authentication Handbook : Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth, SAML and FIDO
Sambit Kumar Dash
Out of stock
Format: Book (Digital download)
Java Cryptography
Jonathon Knudsen
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Book)
£35.99
£25.15
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Book)
Add to BasketHands-On Ethical Hacking and Network Defense
Nicholas Antill
Out of stock
Format: Book (Multiple-component retail product)
Guide to Computer Forensics and Investigations
Amelia (Highline Community College) Phillips
Out of Stock - We are unable to provide an estimated availability date for this product
Format: Book (Multiple-component retail product)
£97.99
Out of Stock - We are unable to provide an estimated availability date for this product
Book (Multiple-component retail product)
Add to BasketFundamentals of Cryptology : A Professional Reference and Interactive Tutorial
Henk C.A. van Tilborg
Out of stock
Format: Book (Multiple-component retail product)
Critical Incident Management
Alan B. Sterneckert
Download - Immediately Available
Format: eBook (PDF)
Authentication Codes and Combinatorial Designs
Dingyi Pei
Download - Immediately Available
Format: eBook (PDF)
Complete Guide to Security and Privacy Metrics : Measuring Regulatory Compliance, Operational Resilience, and ROI
Debra S. (Biological Computing Initiative, North Bethesda, M Herrmann
Download - Immediately Available
Format: eBook (PDF)
Practical Hacking Techniques and Countermeasures
Mark D. Spivey
Download - Immediately Available
Format: eBook (PDF)
Multimedia Watermarking Techniques and Applications
Darko Kirovski
Download - Immediately Available
Format: eBook (PDF)
Statistical Methods in Computer Security
William W.S. Chen
Download - Immediately Available
Format: eBook (PDF)
Wireless Security Handbook
Aaron E. (AE&E Corporation, Redford, Michigan, USA) Earle
Download - Immediately Available
Format: eBook (PDF)
Enhancing Computer Security with Smart Technology
V. Rao Vemuri
Download - Immediately Available
Format: eBook (PDF)
Using the Common Criteria for IT Security Evaluation
Debra S. (Biological Computing Initiative, North Bethesda, M Herrmann
Download - Immediately Available
Format: eBook (PDF)