Malicious Mobile Code : Virus Protection for Windows
Roger A. Grimes
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Book)
£35.99
£24.95
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Book)
Add to BasketData Mining Tools for Malware Detection
Mehedy (University of Texas at Dallas, Richardson, Texas, USA) Masud
Download - Immediately Available
Format: eBook (PDF)
Secure Semantic Service-Oriented Systems
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Protocols for Secure Electronic Commerce
Mostafa Hashem (AT&T, Middletown, New Jersey, USA) Sherif
Download - Immediately Available
Format: eBook (EPUB)
Developing and Securing the Cloud
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Database and Applications Security : Integrating Information Security and Data Management
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Database and Applications Security : Integrating Information Security and Data Management
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Contemporary Issues in Ethics and Information Technology
Robert A. Schultz
Download - Immediately Available
Format: eBook (PDF)
Legal Data and Information in Practice : How Data and the Law Interact
Sarah A. Sutherland
Download - Immediately Available
Format: eBook (PDF)
Legal Data and Information in Practice : How Data and the Law Interact
Sarah A. Sutherland
Download - Immediately Available
Format: eBook (EPUB)
Analyzing and Securing Social Networks
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Fundamentals of Cryptology : A Professional Reference and Interactive Tutorial
Henk C.A. van Tilborg
Out of stock
Format: Book (Multiple-component retail product)
Countering Cyber Sabotage : Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
Andrew A. Bochman
Download - Immediately Available
Format: eBook (PDF)
Countering Cyber Sabotage : Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
Andrew A. Bochman
Download - Immediately Available
Format: eBook (EPUB)
Wireless Multimedia Communication Systems : Design, Analysis, and Implementation
K.R. (University of Texas at Arlington, USA) Rao
Download - Immediately Available
Format: eBook (EPUB)
Wireless Multimedia Communication Systems : Design, Analysis, and Implementation
K.R. (University of Texas at Arlington, USA) Rao
Download - Immediately Available
Format: eBook (PDF)
Securing Windows NT/2000 : From Policies to Firewalls
Michael A. (Stonewall'em, Etobicoke, Ontario, Canada) Simonyi
Download - Immediately Available
Format: eBook (PDF)
Securing Windows NT/2000 : From Policies to Firewalls
Michael A. (Stonewall'em, Etobicoke, Ontario, Canada) Simonyi
Download - Immediately Available
Format: eBook (EPUB)
Managing Global Supply Chains : Compliance, Security, and Dealing with Terrorism
Thomas A. (American River International, Melville, New York, USA Cook
Download - Immediately Available
Format: eBook (PDF)