Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Showing 1 - 24 (of 28)
Refine
CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting - eBook

CheckPoint NG VPN 1/Firewall 1 : Advanced Configuration and Troubleshooting

Syngress

Format: eBook (PDF)

£37.99

£26.59

eBook (PDF)

Add to Basket
Open Information Security Management Maturity Model O-ISM3 - eBook

Open Information Security Management Maturity Model O-ISM3

The Group

Format: eBook (PDF)

£33.59

£26.87

eBook (PDF)

Add to Basket
Keys to the Kingdom : Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks - Book

£39.99

£34.39

Book (Paperback / softback)

Add to Basket
Cybersecurity For Small Networks : A No-Nonsense Guide for the Reasonably Paranoid - Book

Cybersecurity For Small Networks : A No-Nonsense Guide for the Reasonably Paranoid

Seth Enoka

Format: Book (Paperback / softback)

£37.99

£26.89

Book (Paperback / softback)

Add to Basket
Information Security Risk Assessment Toolkit : Practical Assessments through Data Collection and Data Analysis - Book

£39.99

£27.29

Book (Paperback / softback)

Add to Basket
Breaking into Information Security : Crafting a Custom Career Path to Get the Job You Really Want - Book

£27.99

£24.69

Book (Paperback / softback)

Add to Basket
Configuring Check Point NGX VPN-1/Firewall-1 - eBook

Configuring Check Point NGX VPN-1/Firewall-1

Barry J Stiefel

Format: eBook (PDF)

£31.99

£22.39

eBook (PDF)

Add to Basket
Snort 2.1 Intrusion Detection, Second Edition - eBook

Snort 2.1 Intrusion Detection, Second Edition

Brian Caswell

Format: eBook (PDF)

£31.99

£22.39

eBook (PDF)

Add to Basket
Ada and Beyond : Software Policies for the Department of Defense - eBook

£27.00

£24.30

eBook (PDF)

Add to Basket
Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program - Book

£36.99

£31.89

Book (Paperback / softback)

Item not Available
Improving Business Statistics Through Interagency Data Sharing : Summary of a Workshop - eBook

£34.20

£30.78

eBook (PDF)

Add to Basket
Putting People on the Map : Protecting Confidentiality with Linked Social-Spatial Data - eBook

£36.00

£32.40

eBook (PDF)

Add to Basket
Protecting Data Privacy in Health Services Research - eBook

Protecting Data Privacy in Health Services Research

Institute of Medicine

Format: eBook (PDF)

£34.20

£30.78

eBook (PDF)

Add to Basket
Algebraic Informatics : 6th International Conference, CAI 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings - eBook

£39.99

£33.99

eBook (PDF)

Add to Basket
Toward Better Usability, Security, and Privacy of Information Technology : Report of a Workshop - eBook

£28.79

£25.91

eBook (EPUB)

Add to Basket
Information Technology for Counterterrorism : Immediate Actions and Future Possibilities - eBook

£29.40

£26.46

eBook (PDF)

Add to Basket
Ad Hoc Networks : 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings - eBook

£39.99

£33.99

eBook (PDF)

Add to Basket
Financial Cryptography and Data Security : FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers - eBook

£39.99

£33.99

eBook (PDF)

Add to Basket
Trustworthy Global Computing : 10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 Revised Selected Papers - eBook

£34.99

£29.74

eBook (PDF)

Add to Basket
Confronting Cyber Risk : An Embedded Endurance Strategy for Cybersecurity - Book

£21.99

£21.45

Book (Paperback / softback)

Add to Basket
Privacy Research and Best Practices : Summary of a Workshop for the Intelligence Community - eBook

£38.39

£34.55

eBook (EPUB)

Add to Basket
Showing 1 - 24 (of 28)
Refine