Official (ISC)2® Guide to the ISSAP® CBK
(ISC)² Corporate
Download - Immediately Available
Format: eBook (PDF)
Balancing Privacy and Free Speech : Unwanted Attention in the Age of Social Media
Mark Tunick
Download - Immediately Available
Format: eBook (EPUB)
Supply Chain Risk Management : Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
Ken (Oakland Community College, Auburn Hills, Michigan, USA) Sigler
Download - Immediately Available
Format: eBook (EPUB)
Networks of Power in Digital Copyright Law and Policy : Political Salience, Expertise and the Legislative Process
Benjamin Farrand
Download - Immediately Available
Format: eBook (EPUB)
Handbook of Automated Essay Evaluation : Current Applications and New Directions
Mark D. Shermis
Download - Immediately Available
Format: eBook (EPUB)
Coaching Online : A Practical Guide
Kate Anthony
Download - Immediately Available
Format: eBook (EPUB)
Foundation, Architecture, and Prototyping of Humanized AI : A New Constructivist Approach
Mark Chang
Download - Immediately Available
Format: eBook (PDF)
Foundation, Architecture, and Prototyping of Humanized AI : A New Constructivist Approach
Mark Chang
Download - Immediately Available
Format: eBook (EPUB)
Robot Souls : Programming in Humanity
Eve Poole
Download - Immediately Available
Format: eBook (PDF)
Robot Souls : Programming in Humanity
Eve Poole
Download - Immediately Available
Format: eBook (EPUB)
Controlling Privacy and the Use of Data Assets, Volume 1 and 2
Ulf Mattsson
Out of stock
Format: Book (Multiple-component retail product)
Controlling Privacy and the Use of Data Assets, Volume 1 and 2
Ulf Mattsson
Out of stock
Format: Book (Multiple-component retail product)
Audit and Trace Log Management : Consolidation and Analysis
Phillip Q. Maier
Download - Immediately Available
Format: eBook (PDF)
The Ethical Hack : A Framework for Business Value Penetration Testing
James S. Tiller
Download - Immediately Available
Format: eBook (PDF)
Public Key Infrastructure : Building Trusted Applications and Web Services
John R. Vacca
Download - Immediately Available
Format: eBook (PDF)
Surviving Security : How to Integrate People, Process, and Technology
Amanda Andress
Download - Immediately Available
Format: eBook (PDF)
Investigator's Guide to Steganography
Gregory (Computer Security Innovations, Herndon, Virginia, USA Kipper
Download - Immediately Available
Format: eBook (PDF)
The Laws of Software Process : A New Model for the Production and Management of Software
Phillip G. (Corvus International, Chicago, Illinois, USA) Armour
Download - Immediately Available
Format: eBook (PDF)
A Practical Guide to Security Assessments
Sudhanshu Kairab
Download - Immediately Available
Format: eBook (PDF)
Network Perimeter Security : Building Defense In-Depth
Cliff Riggs
Download - Immediately Available
Format: eBook (PDF)
A Technical Guide to IPSec Virtual Private Networks
James S. Tiller
Download - Immediately Available
Format: eBook (PDF)
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
Alfreda Dudley
Download - Immediately Available
Format: eBook (PDF)