Insecure Digital Frontiers : Navigating the Global Cybersecurity Landscape
Akashdeep (University of Petroleum and Energy Studies) Bhardwaj
Pre-Order
Format: Book (Paperback / softback)
Alternate Data Storage Forensics
Amber (CEO, Paraben Corporation, Dallas, TX, USA) Schroader
Out of stock
Format: Book (Paperback / softback)
Stealing the Network : How to Own a Shadow
Johnny (Security Researcher, Founder of Hackers For Charity) Long
Out of stock
Format: Book (Paperback / softback)
Botnets : The Killer Web Applications
Craig (CISO for Portland State University and President of H Schiller
Out of stock
Format: Book (Paperback / softback)
Protecting Data Privacy in Health Services Research
Institute of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
Colin Boyd
Download - Immediately Available
Format: eBook (PDF)
Information Security : 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings
George I. Davida
Download - Immediately Available
Format: eBook (PDF)
Provable Security : First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
Willy Susilo
Download - Immediately Available
Format: eBook (PDF)
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008, Proceedings
Steven Galbraith
Download - Immediately Available
Format: eBook (PDF)
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
National Research Council
Out of Stock - We are unable to provide an estimated availability date for this product
Format: Book (Paperback / softback)
£45.00
£39.99
Out of Stock - We are unable to provide an estimated availability date for this product
Book (Paperback / softback)
Add to BasketTechnology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code
Michael (Author, educator and security advisor, Washington, Erbschloe
Out of stock
Format: Book (Paperback / softback)
Cyber Warfare : A Reference Handbook
Paul J. (Air Command and Staff College, USA) Springer
Out of stock
Format: Book (Hardback)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (PDF)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Out of stock
Format: Book (Paperback / softback)
Big Data Analytics with Applications in Insider Threat Detection
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Download - Immediately Available
Format: eBook (EPUB)
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data : An Excerpt from Malware Forensic Field Guide for Linux Systems
Eoghan (Eoghan Casey, cmdLabs, Baltimore, MD, USA) Casey
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£13.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketSecurity Protocols XVII : 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers
Bruce Christianson
Download - Immediately Available
Format: eBook (PDF)
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
Joon Sang Baek
Download - Immediately Available
Format: eBook (PDF)
Investing in Cryptocurrency : The Ultimate Handbook for Beginner and Advanced Cryptocurrency Investors. 10 Practical Strategies and Much More to Build Wealth with Little or No Money Down
Dr Mario Di Matteo
Item not Available
Format: Book (Paperback / softback)
£20.99
£17.15
Item not Available
Book (Paperback / softback)
Software for Dependable Systems : Sufficient Evidence?
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Cryptography's Role in Securing the Information Society
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Summary of a Workshop on Software Certification and Dependability
National Research Council
Download - Immediately Available
Format: eBook (PDF)