Security Framework for The Internet of Things Applications
Salma Abdalla (Maquarie university, Australia) Hamad
Pre-Order
Format: Book (Hardback)
Ubiquitous Security : Third International Conference, UbiSec 2023, Exeter, UK, November 1–3, 2023, Revised Selected Papers
Guojun Wang
Out of stock
Format: Book (Paperback / softback)
CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting
Syngress
Download - Immediately Available
Format: eBook (PDF)
Open Information Security Management Maturity Model O-ISM3
The Group
Download - Immediately Available
Format: eBook (PDF)
Financial Cryptography and Data Security : 27th International Conference, FC 2023, Bol, Brac, Croatia, May 1–5, 2023, Revised Selected Papers, Part II
Foteini Baldimtsi
Out of stock
Format: Book (Paperback / softback)
Configuring Check Point NGX VPN-1/Firewall-1
Barry J Stiefel
Download - Immediately Available
Format: eBook (PDF)
£30.99
Item not Available
Book (Paperback / softback)
Snort 2.1 Intrusion Detection, Second Edition
Brian Caswell
Download - Immediately Available
Format: eBook (PDF)
Journal of Cyber Security and Mobility 2-1
Ashutosh (Telcordia) Dutta
Out of stock
Format: Book (Paperback / softback)
Journal of Cyber Security and Mobility (6-1)
Ashutosh (Telcordia) Dutta
Out of stock
Format: Book (Paperback / softback)
Journal of Cyber Security and Mobility 4-1 : Resilient and Trustworthy IoT Systems
Geir M Koien
Out of stock
Format: Book (Paperback / softback)
Journal of Cyber Security and Mobility 1-2/3
Ashutosh (Telcordia) Dutta
Item not Available
Format: Book (Paperback / softback)
£25.00
Item not Available
Book (Paperback / softback)
Implementing 802.1X Security Solutions for Wired and Wireless Networks
Jim Geier
Item not Available
Format: Book (Hardback)
£50.00
£42.15
Item not Available
Book (Hardback)
Implementing 802.1X Security Solutions for Wired and Wireless Networks
Jim Geier
Download - Immediately Available
Format: eBook (PDF)
Journal of Cyber Security and Mobility 3-1, Special Issue on Intelligent Data Acquisition and Advanced Computing Systems : Technology and Applications
Igor Kotenko
Out of stock
Format: Book (Paperback / softback)
The The Threatened Net : How the Web Became a Perilous Place
The Washington Post
Download - Immediately Available
Format: eBook (EPUB)
Applied Network Security Monitoring : Collection, Detection, and Analysis
Chris (Senior Information Security Analyst at the DoD, Traine Sanders
Out of stock
Format: Book (Paperback / softback)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang (The University of Alabama, Tuscaloosa, USA) Xiao
Out of stock
Format: Book (Hardback)
No Safe Harbor : The Inside Truth About Cybercrime-and How To Protect Your Business
Mark Sangster
Out of Stock - We are unable to provide an estimated availability date for this product
Format: Book (Hardback)
£17.99
£13.35
Out of Stock - We are unable to provide an estimated availability date for this product
Book (Hardback)
Add to BasketCyber Threat Intelligence : The No-Nonsense Guide for CISOs and Security Managers
Aaron Roberts
Out of stock
Format: Book (Paperback / softback)
Cybersecurity Career Master Plan : Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger
Out of stock
Format: Book (Paperback / softback)
Infrastructure Security : International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings
George Davida
Download - Immediately Available
Format: eBook (PDF)