Cyber Victimology : Decoding Cyber-Crime Victimisation
Debarati (Centre for Cyber Victim Counselling (CCVC), India) Halder
Out of stock
Format: Book (Hardback)
Cyber Victimology : Decoding Cyber-Crime Victimisation
Debarati (Centre for Cyber Victim Counselling (CCVC), India) Halder
Out of stock
Format: Book (Paperback / softback)
Combating Spyware in the Enterprise : Discover, Detect, and Eradicate the Internet's Greatest Threat
Paul (Director of Threat Research for Webroot, USA) Piccard
Out of stock
Format: Book (Paperback / softback)
Data Protection and Confidentiality in Health Informatics
Commission of the European Communities. (CEC) DG for Energy
Out of stock
Format: Book (Hardback)
Security Controls Evaluation, Testing, and Assessment Handbook
Leighton (CTO and Senior Security Engineer for Information Se Johnson
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£55.00
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketDissecting the Hack: The F0rb1dd3n Network, Revised Edition
Brian (Deputy Lead Technical Engineer with the Defense Cyber I Baskin
Out of stock
Format: Book (Paperback / softback)
How to Cheat at Configuring ISA Server 2004
Debra (MCSE, Technology consultant, trainer, and w Littlejohn Shinder
Out of stock
Format: Book (Paperback / softback)
Enterprise Level Security 2 : Advanced Techniques for Information Technology in an Uncertain World
Kevin E. Foltz
Download - Immediately Available
Format: eBook (PDF)
Enterprise Level Security 2 : Advanced Techniques for Information Technology in an Uncertain World
Kevin E. Foltz
Download - Immediately Available
Format: eBook (EPUB)
Enterprise Level Security 2 : Advanced Techniques for Information Technology in an Uncertain World
Kevin E. Foltz
Out of stock
Format: Book (Hardback)
The Development of Blockchain Technology : Research on the Development of Electronic Information Engineering Technology in China
Chinese Academy of Eng Center for Electronics and Information Studies
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£24.99
£21.05
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
David (Senior Researcher, SecureWorks, U.S.A.) Maynor
Out of stock
Format: Book (Paperback / softback)
Privacy Research and Best Practices : Summary of a Workshop for the Intelligence Community
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (PDF)
Privacy Research and Best Practices : Summary of a Workshop for the Intelligence Community
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Stealing the Network : How to Own a Shadow
Johnny (Security Researcher, Founder of Hackers For Charity) Long
Out of stock
Format: Book (Paperback / softback)
Countering Cyber Sabotage : Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
Andrew A. Bochman
Out of stock
Format: Book (Hardback)
A Question of Balance : Private Rights and the Public Interest in Scientific and Technical Databases
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
A Question of Balance : Private Rights and the Public Interest in Scientific and Technical Databases
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Security Software Development : Assessing and Managing Security Risks
CISSP, Douglas A. Ashbaugh
Out of Stock - We are unable to provide an estimated availability date for this product
Format: Book (Hardback)
£89.99
£89.55
Out of Stock - We are unable to provide an estimated availability date for this product
Book (Hardback)
Add to BasketSecurity Software Development : Assessing and Managing Security Risks
CISSP, Douglas A. Ashbaugh
Download - Immediately Available
Format: eBook (PDF)
Cybersecurity in the Current Framework of the EU and Italian Criminal Justice Systems. A Focus on Digital Identity Theft
Clara A. Pettoello-Mantovani
Out of stock
Format: Book (Hardback)
Cybersecurity in the Current Framework of the EU and Italian Criminal Justice Systems. A Focus on Digital Identity Theft
Clara A. Pettoello-Mantovani
Download - Immediately Available
Format: eBook (PDF)
Secure Communicating Systems : Design, Analysis, and Implementation
Michael R. A. Huth
Download - Immediately Available
Format: eBook (PDF)
£5.00
Item not Available
Book (Spiral bound)