The Shortest Hour : An Applied Approach to Boardroom Governance of Cybersecurity
Lee (Lee Parrish Ventures, USA) Parrish
Pre-Order
Format: Book (Hardback)
The Shortest Hour : An Applied Approach to Boardroom Governance of Cybersecurity
Lee (Lee Parrish Ventures, USA) Parrish
Pre-Order
Format: Book (Paperback / softback)
Why CISOs Fail 2e and The Security Hippie Set
Barak Engel
Out of stock
Format: Book (Multiple-component retail product)
Why CISOs Fail 2e and The Security Hippie Set
Barak Engel
Out of stock
Format: Book (Multiple-component retail product)
Data Protection in the Financial Services Industry
Mandy Webster
Pre-Order
Format: Book (Paperback / softback)
Networks Attack Detection on 5G Networks using Data Mining Techniques
Sagar Dhanraj (VIT-AP University, Andhra Pradesh, India) Pande
Download - Immediately Available
Format: eBook (PDF)
Networks Attack Detection on 5G Networks using Data Mining Techniques
Sagar Dhanraj (VIT-AP University, Andhra Pradesh, India) Pande
Download - Immediately Available
Format: eBook (EPUB)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download - Immediately Available
Format: eBook (PDF)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download - Immediately Available
Format: eBook (EPUB)
Blockchain-based Cyber Security : Applications and Paradigms
Kaushal (Pandit Deendayal Energy University, India) Shah
Download - Immediately Available
Format: eBook (PDF)
Blockchain-based Cyber Security : Applications and Paradigms
Kaushal (Pandit Deendayal Energy University, India) Shah
Download - Immediately Available
Format: eBook (EPUB)
How to Use Customer Data : Navigating GDPR, DPDI and a Future with Marketing AI
Sachiko Scheuing
Pre-Order
Format: Book (Hardback)
Our Next Reality : How the AI-powered Metaverse Will Reshape the World
Alvin Wang Graylin
Download - Immediately Available
Format: eBook (EPUB)
Smart Boundaries : Safe Children - A Parent's Handbook
Well-Being Publishing
Out of stock
Format: Book (Paperback / softback)
Introduction to Cybersecurity : Concepts, Principles, Technologies and Practices
Ajay Singh
Out of stock
Format: Book (Paperback / softback)
The Boundaries of Data
Bart Sloot
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Digital Armor : The Confessions of a Reformed Hacker
Jacinto Luis Marques
Out of stock
Format: Book (Paperback / softback)
Digital Armor : The Confessions of a Reformed Hacker
Jacinto Luis Marques
Out of stock
Format: Book (Hardback)
Multimedia Watermarking : Latest Developments and Trends
Aditya Kumar Sahu
Out of stock
Format: Book (Hardback)
Hello World : How to be Human in the Age of the Machine
Hannah Fry
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£10.99
£9.85
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketPermanent Record : A Memoir of a Reluctant Whistleblower
Edward Snowden
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
The Art of Deception : Controlling the Human Element of Security
Kevin D. (Thousand Oaks, CA, Security Consultant ) Mitnick
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£10.00
£9.35
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to Basket