Phishing Detection Using Content-Based Image Classification
Shekhar (IBM software labs) Khandelwal
Download - Immediately Available
Format: eBook (EPUB)
Critical Infrastructure : Homeland Security and Emergency Preparedness
Robert (CIPS, Infracritical, Geneva, Illinois, USA) Radvanovsky
Out of stock
Format: Book (Hardback)
Pen Testing from Contract to Report
Alfred (ISACA; ECE;Mathematical Association of America) Basta
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Sharing Health Data : The Why, the Will, and the Way Forward
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Health Data Sharing to Support Better Outcomes : Building a Foundation of Stakeholder Trust
National Academy of Medicine
Download - Immediately Available
Format: eBook (EPUB)
Charting a Path in a Shifting Technical and Geopolitical Landscape : Post-Exascale Computing for the National Nuclear Security Administration
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Data Exfiltration Threats and Prevention Techniques : Machine Learning and Memory-Based Data Security
Zahir (The Royal Melbourne Institute of Technology, Australia) Tari
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£102.00
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketIndustry 4.0 Technologies: Sustainable Manufacturing Supply Chains : Volume 1—Theory, Challenges, and Opportunity
K E K Vimal
Out of stock
Format: Book (Hardback)
Attribute-based Encryption (ABE) : Foundations and Applications within Blockchain and Cloud Environments
Qi (University of Electronic Science and Technology of China (UES Xia
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Configuring Check Point NGX VPN-1/Firewall-1
Barry J Stiefel
Download - Immediately Available
Format: eBook (PDF)
802.1X Port-Based Authentication
Edwin Lyle Brown
Download - Immediately Available
Format: eBook (PDF)
Snort 2.1 Intrusion Detection, Second Edition
Brian Caswell
Download - Immediately Available
Format: eBook (PDF)
Practical LPIC-1 Linux Certification Study Guide
David Clinton
Out of stock
Format: Book (Paperback / softback)
Memory Dump Analysis Anthology, Volume 1, Revised Edition
Dmitry Vostokov
Out of stock
Format: Book (Paperback / softback)
Journal of Cyber Security and Mobility (6-1)
Ashutosh (Telcordia) Dutta
Out of stock
Format: Book (Paperback / softback)
Encyclopedia of Crash Dump Analysis Patterns, Volume 1, A-J : Detecting Abnormal Software Structure and Behavior in Computer Memory, Third Edition
Dmitry Vostokov
Out of stock
Format: Book (Paperback / softback)
Cryptography: A Very Short Introduction
Fred (, Director of the Information Security Group and Professo Piper
Out of stock
Format: Book (Paperback / softback)
Practical Lock Picking : A Physical Penetration Tester's Training Guide
Deviant (Member of the Board of Directors of the U.S. division Ollam
Out of stock
Format: Book (Paperback / softback)
Whaling for Beginners Book 1 - Breach : Book one: Breach
Jerome Vincent
Item not Available
Format: Book (Paperback / softback)
£4.99
Item not Available
Book (Paperback / softback)
Cryptocurrencies and Blockchain Technology : Cryptocurrencies and Blockchain: 4 Books in 1
Keizer Soeze
Out of stock
Format: Book (Paperback / softback)