Code Dependent : Living in the Shadow of AI — Shortlisted for the Women's Prize for Non-fiction
Madhumita Murgia
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Sovereignty Blockchain 2.0 : New Forces Changing the World of Future
Lian Yuming
Out of stock
Format: Book (Paperback / softback)
Scrm 2.0 : 21st Century Supply Chain Risk Management Solutions
Mark a Russo Cissp-Issap Itilv3
Out of stock
Format: Book (Paperback / softback)
Sovereignty Blockchain 2.0 : New Forces Changing the World of Future
Lian Yuming
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£89.99
£78.79
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketThe Rise of the Cyber Women Volume Three
Lisa Ventura
Out of stock
Format: Book (Paperback / softback)
Applied Reconfigurable Computing. Architectures, Tools, and Applications : 20th International Symposium, ARC 2024, Aveiro, Portugal, March 20–22, 2024, Proceedings
Iouliia Skliarova
Out of stock
Format: Book (Paperback / softback)
SAP HANA 2.0 Security Guide
Jonathan Haun
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£97.00
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketSecurity in a Web 2.0+ World : A Standards-Based Approach
Carlos Curtis Solari
Item not Available
Format: Book (Hardback)
£29.99
£20.05
Item not Available
Book (Hardback)
Information Systems Security : 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings
Vallipuram Muthukkumarasamy
Out of stock
Format: Book (Paperback / softback)
Decision and Game Theory for Security : 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Proceedings
Jie Fu
Out of stock
Format: Book (Paperback / softback)
Keycloak - Identity and Access Management for Modern Applications : Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications
Stian Thorgersen
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
Hacking the Hacker : Learn From the Experts Who Take Down Hackers
Roger A. Grimes
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£21.00
£15.69
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketAgile Application Security : Enabling Security in a Continuous Delivery Pipeline
Rich Smith
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£47.99
£33.35
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketHow the F*ck Did This Happen? : A guide for executives who need to understand Cyber Security in plain, actionable language
Darryl Carlton
Out of stock
Format: Book (Paperback / softback)
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
Dan Shoemaker
Out of stock
Format: Book (Paperback / softback)
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)
Dan Shoemaker
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£79.99
£79.85
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketInformation and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings
Ding Wang
Out of stock
Format: Book (Paperback / softback)
Provable and Practical Security : 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings
Mingwu Zhang
Out of stock
Format: Book (Paperback / softback)
Advances in Cryptology - CRYPTO 2023 : 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I
Helena Handschuh
Out of stock
Format: Book (Paperback / softback)
Mobile OS Vulnerabilities : Quantitative and Qualitative Analysis
Shivi (J.C. Bose University) Garg
Out of stock
Format: Book (Hardback)