The Definitive Guide to KQL : Using Kusto Query Language for operations, defending, and threat hunting
Mark Morowczynski
Download - Immediately Available
Format: eBook (PDF)
The Definitive Guide to KQL : Using Kusto Query Language for operations, defending, and threat hunting
Mark Morowczynski
Download - Immediately Available
Format: eBook (EPUB)
Carbon Superstructures : From Quantum Transport to Quantum Computation
Somnath (University of the Witwatersrand, South Africa) Bhattacharyya
Out of stock
Format: Book (Hardback)
From Exposed to Secure : The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe
Featuring Cybersecurity And Compliance Experts From Around The World
Out of stock
Format: Book (Paperback / softback)
Security Framework for The Internet of Things Applications
Salma Abdalla (Maquarie university, Australia) Hamad
Pre-Order
Format: Book (Hardback)
EU Data Privacy Law and Serious Crime : Data Retention and Policymaking
Nora (Lecturer in Law and Director of the Information Law Ni Loideain
Pre-Order
Format: Book (Hardback)
Cybersecurity and Cyberwar : What Everyone Needs to Know®
Peter W. (Senior Fellow, Senior Fellow, Brookings Institution) Singer
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£10.99
£9.59
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketKeys to the Kingdom : Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Deviant (Member of the Board of Directors of the U.S. division Ollam
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£34.39
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketSecure, Resilient, and Agile Software Development
Mark Merkow
Download - Immediately Available
Format: eBook (EPUB)
The Basics of Digital Forensics : The Primer for Getting Started in Digital Forensics
John (Associate Professor and Director of the Digital Forensi Sammons
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£27.99
£19.45
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketOpen Information Security Management Maturity Model O-ISM3
The Group
Download - Immediately Available
Format: eBook (PDF)
Secure, Resilient, and Agile Software Development
Mark Merkow
Download - Immediately Available
Format: eBook (PDF)
Perfect Password : Selection, Protection, Authentication
Mark Burnett
Download - Immediately Available
Format: eBook (PDF)
Balancing Privacy and Free Speech : Unwanted Attention in the Age of Social Media
Mark Tunick
Download - Immediately Available
Format: eBook (EPUB)
Information Security Risk Assessment Toolkit : Practical Assessments through Data Collection and Data Analysis
Mark (Chief Threat Scientist of Zvelo Inc) Talabis
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£27.29
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketCompTIA Security+ Guide to Network Security Fundamentals
Mark (Western Kentucky University) Ciampa
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
Art of Software Security Assessment, The : Identifying and Preventing Software Vulnerabilities
Mark Dowd
Download - Immediately Available
Format: eBook (EPUB)
Cyber Strategy : Risk-Driven Security and Resiliency
Carol A. Siegel
Download - Immediately Available
Format: eBook (PDF)
Cyber Strategy : Risk-Driven Security and Resiliency
Carol A. Siegel
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£38.99
£35.59
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketSecurity Awareness : Applying Practical Cybersecurity in Your World
Mark (Western Kentucky University) Ciampa
Out of stock
Format: Book (Paperback / softback)
Economic Crime : From Conception to Response
Mark Button
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£35.99
£33.49
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketArchitecture for Blockchain Applications
Xiwei Xu
Download - Immediately Available
Format: eBook (PDF)
Art of Software Security Assessment, The : Identifying and Preventing Software Vulnerabilities
Mark Dowd
Download - Immediately Available
Format: eBook (PDF)