Facial Recognition Technology : Current Capabilities, Future Prospects, and Governance
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Open Information Security Management Maturity Model O-ISM3
The Group
Download - Immediately Available
Format: eBook (PDF)
Keys to the Kingdom : Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Deviant (Member of the Board of Directors of the U.S. division Ollam
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£34.39
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketMeasuring and Managing Information Risk : A FAIR Approach
Jack (VP, Head of Cyber Risk Methodology for BitSight, US.) Freund
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£34.25
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketQuantum Key Distribution : An Introduction with Exercises
Ramona Wolf
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£34.99
£28.35
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketInformation Security Risk Assessment Toolkit : Practical Assessments through Data Collection and Data Analysis
Mark (Chief Threat Scientist of Zvelo Inc) Talabis
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£39.99
£27.29
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketBreaking into Information Security : Crafting a Custom Career Path to Get the Job You Really Want
Josh (Senior Security Consultant, RJS Smart Security (CISSP, GIA More
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£27.99
£24.69
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketIDs -- Not That Easy : Questions About Nationwide Identity Systems
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Practical Lock Picking : A Physical Penetration Tester's Training Guide
Deviant (Member of the Board of Directors of the U.S. division Ollam
Out of stock
Format: Book (Paperback / softback)
Ada and Beyond : Software Policies for the Department of Defense
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Improving Business Statistics Through Interagency Data Sharing : Summary of a Workshop
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Putting People on the Map : Protecting Confidentiality with Linked Social-Spatial Data
National Research Council
Download - Immediately Available
Format: eBook (PDF)
The Basics of Cyber Safety : Computer and Mobile Device Safety Made Easy
John (Associate Professor and Director of the Digital Forensi Sammons
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£23.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketPrivacy in the Age of Big Data : Recognizing Threats, Defending Your Rights, and Protecting Your Family
Theresa Payton
Item not Available
Format: Book (Hardback)
£38.00
£33.99
Item not Available
Book (Hardback)
Network Intrusion Analysis : Methodologies, Tools, and Techniques for Incident Analysis and Response
Joe (Joe Fichera is a Certified Computer Examiner (CCE) and m Fichera
Out of stock
Format: Book (Paperback / softback)
Toward Better Usability, Security, and Privacy of Information Technology : Report of a Workshop
Security, and Privacy of Computer Steering Committee on the Usability
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£23.99
£21.85
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketToward Better Usability, Security, and Privacy of Information Technology : Report of a Workshop
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program
John (Principal of IMCue Solutions, Editor of the Data Strateg Ladley
Item not Available
Format: Book (Paperback / softback)
£36.99
£31.89
Item not Available
Book (Paperback / softback)
Confronting Cyber Risk : An Embedded Endurance Strategy for Cybersecurity
Gregory J. (Assistant Professor, Department of Civil and System Falco
In Stock - usually despatched within 24 hours
Format: Book (Paperback / softback)
£21.99
£21.45
In Stock - usually despatched within 24 hours
Book (Paperback / softback)
Add to BasketCharting a Path in a Shifting Technical and Geopolitical Landscape : Post-Exascale Computing for the National Nuclear Security Administration
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Information Technology for Counterterrorism : Immediate Actions and Future Possibilities
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Windows 2012 Server Network Security : Securing Your Windows Network Systems and Infrastructure
Derrick ((CISSP, CASP, MCSE) has been in the IT field for al Rountree
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£34.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketFor the Record : Protecting Electronic Health Information
National Research Council
Download - Immediately Available
Format: eBook (PDF)
For the Record : Protecting Electronic Health Information
National Research Council
Download - Immediately Available
Format: eBook (EPUB)