Security for Wireless Sensor Networks using Identity-Based Cryptography
Harsh Kupwade Patil
Out of stock
Format: Book (Paperback / softback)
Security for Wireless Sensor Networks using Identity-Based Cryptography
Harsh Kupwade Patil
Download - Immediately Available
Format: eBook (PDF)
Security for Wireless Sensor Networks using Identity-Based Cryptography
Harsh Kupwade Patil
Download - Immediately Available
Format: eBook (EPUB)
Policing Transnational Organized Crime and Corruption : Exploring the Role of Communication Interception Technology
M. Congram
Out of stock
Format: Book (Hardback)
Financial Investigation and Forensic Accounting
George A., Ph.D,CFE,EA Manning
Out of stock
Format: Book (Paperback / softback)
Fundamentals of Cryptology : A Professional Reference and Interactive Tutorial
van Tilborg Henk C.A. van Tilborg
Out of stock
Format: Book (Paperback)
Introduction to Public Key Infrastructures
Johannes A. Buchmann
Out of stock
Format: Book (Paperback / softback)
Introduction to Public Key Infrastructures
Johannes A. Buchmann
Download - Immediately Available
Format: eBook (PDF)
Hands-On Application Penetration Testing with Burp Suite : Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
Carlos A. Lozano
Out of stock
Format: Book (Paperback / softback)
£54.99
£45.59
Item not Available
Book (Paperback / softback)
PKI: Implementing & Managing E-Security
Andrew Nash
Download - Immediately Available
Format: eBook (PDF)
Handbook of Applied Cryptography
Alfred J. Menezes
Download - Immediately Available
Format: eBook (EPUB)
Cyber War versus Cyber Realities : Cyber Conflict in the International System
Brandon (Senior Lecturer, Senior Lecturer, University of Gl Valeriano
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£37.49
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketMultilevel Security for Relational Databases
Osama S. Faragallah
Download - Immediately Available
Format: eBook (PDF)
Black Hat Physical Device Security: Exploiting Hardware and Software
Drew (Instructor for Black Hat Training, Inc. U.S.A.) Miller
Out of stock
Format: Book (Hardback)
Library Patrons' Privacy : Questions and Answers
Valenti Sandra J. Valenti
Download - Immediately Available
Format: eBook (PDF)
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
James C (Deputy Director of Global Security Development for Co Foster
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£37.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketSecure Computers and Networks : Analysis, Design, and Implementation
Eric A. (KPMG LLP, Plano, Texas, USA) Fisch
Out of stock
Format: Book (Hardback)
Security Log Management : Identifying Patterns in the Chaos
Jacob (Contractor with a government agency filling the role of Babbin
Out of stock
Format: Book (Paperback / softback)
XSS Attacks : Cross Site Scripting Exploits and Defense
Seth (Vice President, Airscanner, Dallas, TX, USA) Fogie
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£46.50
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketSecurity Education, Awareness and Training : SEAT from Theory to Practice
Carl (Security Consultant, Richmond, VA, USA) Roper
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£48.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to Basket