Handbook of Human-Computer Interaction : Foundations and Advances
Constantine (University of Crete, Greece) Stephanidis
Pre-Order
Format: Book (Multiple-component retail product)
Why CISOs Fail 2e and The Security Hippie Set
Barak Engel
Out of stock
Format: Book (Multiple-component retail product)
Artificial Intelligence and Information Technologies : Proceedings of the 1st International Conference on Artificial Intelligence and Information Technologies (ICAIIT 2023), 3–4 November 2023, Uzbekis
Arvind Dagur
Pre-Order
Format: Book (Multiple-component retail product)
The Security Leader’s Communication Playbook and Leading the Digital Workforce Set
Jeffrey W. Brown
Pre-Order
Format: Book (Multiple-component retail product)
Controlling Privacy and the Use of Data Assets Set
Ulf Mattsson
Pre-Order
Format: Book (Multiple-component retail product)
Cognitive Hack and Cognitive Risk Set
James (Global Compliance Associates, LLC, Lincoln, Rhode Island, Bone
Pre-Order
Format: Book (Multiple-component retail product)
Mastering the Five Tiers of Audit Competency and Say What!? Communicate with Tact and Impact Set
Ann M. Butera
Pre-Order
Format: Book (Multiple-component retail product)
CBAP® Certification and BABOK® Study Guide
Hans (JTC Unlimited, Molndal, Sweden) Jonasson
Download - Immediately Available
Format: eBook (EPUB)
Official (ISC)2® Guide to the ISSAP® CBK
(ISC)² Corporate
Download - Immediately Available
Format: eBook (EPUB)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
CBAP® Certification and BABOK® Study Guide
Hans (JTC Unlimited, Molndal, Sweden) Jonasson
Download - Immediately Available
Format: eBook (PDF)
Handbook of Automated Essay Evaluation : Current Applications and New Directions
Mark D. Shermis
Download - Immediately Available
Format: eBook (EPUB)
Operational Auditing : Principles and Techniques for a Changing World
Hernan (Murdock Global Advisors, Wayland, Massachusetts, USA) Murdock
Download - Immediately Available
Format: eBook (EPUB)
Digital Forensics for Handheld Devices
Eamon P. Doherty
Download - Immediately Available
Format: eBook (PDF)
Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
Ken (Oakland Community College, Auburn Hills, Michigan, USA) Sigler
Download - Immediately Available
Format: eBook (EPUB)
Official (ISC)2® Guide to the ISSAP® CBK
(ISC)² Corporate
Download - Immediately Available
Format: eBook (PDF)
Controlling Privacy and the Use of Data Assets, Volume 1 and 2
Ulf Mattsson
Out of stock
Format: Book (Multiple-component retail product)
Controlling Privacy and the Use of Data Assets, Volume 1 and 2
Ulf Mattsson
Out of stock
Format: Book (Multiple-component retail product)
Healthcare Fraud Investigation Guidebook
Charles E. Piper
Download - Immediately Available
Format: eBook (PDF)
PCI Compliance : The Definitive Guide
Abhay Bhargav
Download - Immediately Available
Format: eBook (EPUB)
Ethics and the Internal Auditor's Political Dilemma : Tools and Techniques to Evaluate a Company's Ethical Culture
Lynn (Consulting, Business Advisory and Training, Overland P Fountain
Download - Immediately Available
Format: eBook (PDF)
Network and Data Security for Non-Engineers
Frank M. (Ball State University, Muncie, Indiana, USA) Groom
Download - Immediately Available
Format: eBook (PDF)
Illegal Online File Sharing, Decision-Analysis, and the Pricing of Digital Goods
Michael I. C. Nwogugu
Download - Immediately Available
Format: eBook (PDF)
Internet and Electronic Commerce Law in the European Union
Mr John Dickie
Download - Immediately Available
Format: eBook (PDF)