Physical Biometrics for Hardware Security of DSP and Machine Learning Coprocessors
Anirban (Associate Professor, Indian Institute of Technology Sengupta
Out of stock
Format: Book (Hardback)
Privacy-preserving Computing : for Big Data Analytics and AI
Kai (Hong Kong University of Science and Technology) Chen
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Thinking About Victimization : Context and Consequences
Jillian J. (Florida State University, USA) Turanovic
Out of stock
Format: Book (Hardback)
Thinking About Victimization : Context and Consequences
Jillian J. (Florida State University, USA) Turanovic
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£35.99
£33.25
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketCryptography: A Very Short Introduction
Fred (, Director of the Information Security Group and Professo Piper
Out of stock
Format: Book (Paperback / softback)
Practical Lock Picking : A Physical Penetration Tester's Training Guide
Deviant (Member of the Board of Directors of the U.S. division Ollam
Out of stock
Format: Book (Paperback / softback)
Snort Intrusion Detection and Prevention Toolkit
Brian (Snort.org webmaster, USA) Caswell
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£36.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketSecurity in Distributed, Grid, Mobile, and Pervasive Computing
Yang (The University of Alabama, Tuscaloosa, USA) Xiao
Out of stock
Format: Book (Hardback)
Guide to Computer Forensics and Investigations
Christopher (ITForensics, Inc. and University of Washington) Steuart
Out of Stock - We are unable to provide an estimated availability date for this product
Format: Book (Multiple-component retail product)
£97.99
Out of Stock - We are unable to provide an estimated availability date for this product
Book (Multiple-component retail product)
Add to BasketSecurity in Distributed, Grid, Mobile, and Pervasive Computing
Yang (The University of Alabama, Tuscaloosa, USA) Xiao
Download - Immediately Available
Format: eBook (EPUB)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang (The University of Alabama, Tuscaloosa, USA) Xiao
Download - Immediately Available
Format: eBook (PDF)
Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program
John (Principal of IMCue Solutions, Editor of the Data Strateg Ladley
Item not Available
Format: Book (Paperback / softback)
£36.99
£31.89
Item not Available
Book (Paperback / softback)
CISM Certified Information Security Manager Study Guide
Mike (University of Notre Dame) Chapple
Out of stock
Format: Book (Paperback / softback)
Know Your Enemy : Learning about Security Threats
The Honeynet Project
Item not Available
Format: Book (Paperback / softback)
£40.47
Item not Available
Book (Paperback / softback)
Computer Crimes and Digital Investigations
Ian (Professor of Information and Communications Law and Head Walden
Out of stock
Format: Book (Hardback)
Secure Semantic Service-Oriented Systems
Bhavani (The University of Texas at Dallas, USA) Thuraisingham
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£135.00
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketData Protection and Confidentiality in Health Informatics
Commission of the European Communities. (CEC) DG for Energy
Out of stock
Format: Book (Hardback)
Information Hiding Techniques for Steganography and Digital Watermarking
Fabien (Candidate in Computer Science, University of Cambr Petitcolas
Out of stock
Format: Book (Hardback)
Ada and Beyond : Software Policies for the Department of Defense
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Web Application Vulnerabilities : Detect, Exploit, Prevent
Steven (Member of the FBI’s Infragard Organization and Penetra Palmer
Out of stock
Format: Book (Paperback / softback)
Data Exfiltration Threats and Prevention Techniques : Machine Learning and Memory-Based Data Security
Zahir (The Royal Melbourne Institute of Technology, Australia) Tari
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£102.00
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketDatabase and Applications Security : Integrating Information Security and Data Management
Bhavani (The University of Texas at Dallas, Richardson, Thuraisingham
Download - Immediately Available
Format: eBook (PDF)