Data Exfiltration Threats and Prevention Techniques : Machine Learning and Memory-Based Data Security
Zahir (The Royal Melbourne Institute of Technology, Australia) Tari
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£102.00
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketHow to Cheat at Windows System Administration Using Command Line Scripts
Pawan K Bhardwaj
Download - Immediately Available
Format: eBook (PDF)
Cryptography: A Very Short Introduction
Fred (, Director of the Information Security Group and Professo Piper
Out of stock
Format: Book (Paperback / softback)
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
George I Davida
Download - Immediately Available
Format: eBook (PDF)
Discrete Mathematics With Cryptographic Applications : A Self-Teaching Introduction
Alexander I. Kheyfits
Download - Immediately Available
Format: eBook (PDF)
Discrete Mathematics With Cryptographic Applications : A Self-Teaching Introduction
Alexander I. Kheyfits
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£69.00
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketKnow Your Enemy : Learning about Security Threats
The Honeynet Project
Item not Available
Format: Book (Paperback / softback)
£40.47
Item not Available
Book (Paperback / softback)
Hacking With Kali Linux : A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 1)
Learn Computer Hacking in Deep
Item not Available
Format: Book (Paperback / softback)
£19.99
£16.15
Item not Available
Book (Paperback / softback)
£29.99
£22.29
Item not Available
Book (Hardback)
Hacking With Kali Linux : A Beginner's Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing To Fully Understand Computer Cyber Security (Part 2)
Learn Computer Hacking in Deep
Item not Available
Format: Book (Paperback / softback)
£19.99
£16.15
Item not Available
Book (Paperback / softback)
£29.99
£22.29
Item not Available
Book (Hardback)
£19.99
£16.59
Item not Available
Book (Paperback / softback)
£29.99
£22.29
Item not Available
Book (Hardback)
£19.99
£16.59
Item not Available
Book (Paperback / softback)
£29.99
£22.29
Item not Available
Book (Hardback)
£29.99
£21.85
Item not Available
Book (Paperback / softback)
£24.99
£18.99
Item not Available
Book (Paperback / softback)
£34.99
£27.29
Item not Available
Book (Hardback)
Introduction to Modern Number Theory : Fundamental Problems, Ideas and Theories
Yu. I. Manin
Out of stock
Format: Book (Paperback / softback)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang (The University of Alabama, Tuscaloosa, USA) Xiao
Out of stock
Format: Book (Hardback)
Engaging Privacy and Information Technology in a Digital Age
National Research Council
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£49.00
£42.65
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketEngaging Privacy and Information Technology in a Digital Age
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Engaging Privacy and Information Technology in a Digital Age
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Database and Applications Security : Integrating Information Security and Data Management
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (PDF)