Critical Infrastructure Protection, Risk Management, and Resilience : A Policy Perspective
Kelley A. Pesch-Cronin
Download - Immediately Available
Format: eBook (PDF)
Critical Infrastructure Protection, Risk Management, and Resilience : A Policy Perspective
Kelley A. Pesch-Cronin
Download - Immediately Available
Format: eBook (EPUB)
Malicious Mobile Code : Virus Protection for Windows
Roger A. Grimes
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Book)
£35.99
£24.95
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Book)
Add to BasketData Mining Tools for Malware Detection
Mehedy (University of Texas at Dallas, Richardson, Texas, USA) Masud
Download - Immediately Available
Format: eBook (PDF)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Database and Applications Security : Integrating Information Security and Data Management
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Developing and Securing the Cloud
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Database and Applications Security : Integrating Information Security and Data Management
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Protocols for Secure Electronic Commerce
Mostafa Hashem (AT&T, Middletown, New Jersey, USA) Sherif
Download - Immediately Available
Format: eBook (EPUB)
Contemporary Issues in Ethics and Information Technology
Robert A. Schultz
Download - Immediately Available
Format: eBook (PDF)
Legal Data and Information in Practice : How Data and the Law Interact
Sarah A. Sutherland
Download - Immediately Available
Format: eBook (PDF)
Legal Data and Information in Practice : How Data and the Law Interact
Sarah A. Sutherland
Download - Immediately Available
Format: eBook (EPUB)
Managing Global Supply Chains : Compliance, Security, and Dealing with Terrorism
Thomas A. Cook
Download - Immediately Available
Format: eBook (EPUB)
Managing Global Supply Chains : Compliance, Security, and Dealing with Terrorism
Thomas A. Cook
Download - Immediately Available
Format: eBook (PDF)
Analyzing and Securing Social Networks
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Security Software Development : Assessing and Managing Security Risks
CISSP, Douglas A. Ashbaugh
Download - Immediately Available
Format: eBook (PDF)
Fundamentals of Cryptology : A Professional Reference and Interactive Tutorial
Henk C.A. van Tilborg
Out of stock
Format: Book (Multiple-component retail product)
Countering Cyber Sabotage : Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
Andrew A. Bochman
Download - Immediately Available
Format: eBook (PDF)
Countering Cyber Sabotage : Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
Andrew A. Bochman
Download - Immediately Available
Format: eBook (EPUB)
Security for Wireless Sensor Networks using Identity-Based Cryptography
Harsh Kupwade Patil
Download - Immediately Available
Format: eBook (PDF)