XSS Attacks : Cross Site Scripting Exploits and Defense
Seth (Vice President, Airscanner, Dallas, TX, USA) Fogie
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£46.50
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketNetwork Security Evaluation Using the NSA IEM
Russ (Penetration Tester for a Federal Agency and Co-founder/C Rogers
Out of stock
Format: Book (Paperback / softback)
Decrypting the Encryption Debate : A Framework for Decision Makers
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Information Security Science : Measuring the Vulnerability to Data Compromises
Carl (Managing Director and Chief Security Officer, Stroz Fried Young
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£47.99
£41.95
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketCybersecurity Today and Tomorrow : Pay Now or Pay Later
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Cybersecurity Today and Tomorrow : Pay Now or Pay Later
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Who Goes There? : Authentication Through the Lens of Privacy
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
IDs -- Not That Easy : Questions About Nationwide Identity Systems
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Obfuscation : A User's Guide for Privacy and Protest
Finn (Assistant Professor of Media, Culture, and Communicatio Brunton
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£12.99
£10.69
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketPlacing the Suspect Behind the Keyboard : Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Brett (Digital Forensics Practitioner, expert witness, and Ad Shavers
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£41.50
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketVideo Conferencing over IP: Configure, Secure, and Troubleshoot
Michael (Computer security consultant, host and webmaster, www. Gough
Out of stock
Format: Book (Paperback / softback)
PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance
Branden (CISSP and CISM) Williams
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£42.99
£40.89
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketSummary of a Workshop on Information Technology Research for Federal Statistics
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Recoverability as a First-Class Security Objective : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Computers at Risk : Safe Computing in the Information Age
System Security Study Committee
Item not Available
Format: Book (Paperback)
£56.00
£46.59
Item not Available
Book (Paperback)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Secure Data Science : Integrating Cyber Security and Data Science
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Biometric Recognition : Challenges and Opportunities
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Obfuscation : A User's Guide for Privacy and Protest
Finn (Assistant Professor of Media, Culture, and Communicatio Brunton
Out of stock
Format: Book (Paperback / softback)
Scaling Up : A Research Agenda for Software Engineering
National Research Council
Download - Immediately Available
Format: eBook (PDF)