Cybersecurity and Cyberwar : What Everyone Needs to Know®
Peter W. (Senior Fellow, Senior Fellow, Brookings Institution) Singer
Out of stock
Format: Book (Hardback)
Security Log Management : Identifying Patterns in the Chaos
Jacob (Contractor with a government agency filling the role of Babbin
Out of stock
Format: Book (Paperback / softback)
Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2
Jan (Senior Consultant, HP Consulting and Integration, Hewl De Clercq
Out of stock
Format: Book (Paperback / softback)
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Michael Rash
Out of stock
Format: Book (Paperback / softback)
Investigating Windows Systems
Harlan (DFIR analyst, presenter, and open-source tool author) Carvey
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£53.95
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketThreatening Communications and Behavior : Perspectives on the Pursuit of Public Figures
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Foundational Cybersecurity Research : Improving Science, Engineering, and Institutions
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Protecting Individual Privacy in the Struggle Against Terrorists : A Framework for Program Assessment
National Research Council
Download - Immediately Available
Format: eBook (PDF)
Protecting Individual Privacy in the Struggle Against Terrorists : A Framework for Program Assessment
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
2020 Census Data Products: Data Needs and Privacy Considerations : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
XSS Attacks : Cross Site Scripting Exploits and Defense
Seth (Vice President, Airscanner, Dallas, TX, USA) Fogie
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£46.50
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketSecurity Controls Evaluation, Testing, and Assessment Handbook
Leighton (CTO and Senior Security Engineer for Information Se Johnson
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£76.95
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketNetwork Security Evaluation Using the NSA IEM
Russ (Penetration Tester for a Federal Agency and Co-founder/C Rogers
Out of stock
Format: Book (Paperback / softback)
Decrypting the Encryption Debate : A Framework for Decision Makers
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Effective Security Management
Charles A. (Independent security management consultant, exp Sennewald
Out of stock
Format: Book (Hardback)
Information Security Science : Measuring the Vulnerability to Data Compromises
Carl (Managing Director and Chief Security Officer, Stroz Fried Young
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£47.99
£41.95
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketWho Goes There? : Authentication Through the Lens of Privacy
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
IDs -- Not That Easy : Questions About Nationwide Identity Systems
National Research Council
Download - Immediately Available
Format: eBook (EPUB)
Implications of Artificial Intelligence for Cybersecurity : Proceedings of a Workshop
Engineering, and Medicine National Academies of Sciences
Download - Immediately Available
Format: eBook (EPUB)
Placing the Suspect Behind the Keyboard : Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Brett (Digital Forensics Practitioner, expert witness, and Ad Shavers
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Paperback / softback)
£41.50
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Paperback / softback)
Add to BasketLeading the Internal Audit Function
Lynn (Consulting, Business Advisory and Training, Overland P Fountain
Available to Order - This title is available to order, with delivery expected within 2 weeks
Format: Book (Hardback)
£62.99
Available to Order - This title is available to order, with delivery expected within 2 weeks
Book (Hardback)
Add to BasketVideo Conferencing over IP: Configure, Secure, and Troubleshoot
Michael (Computer security consultant, host and webmaster, www. Gough
Out of stock
Format: Book (Paperback / softback)
Corporate Security Intelligence and Strategic Decision Making
Justin (CEO and Founder, Sibylline Ltd, London, UK) Crump
Out of stock
Format: Book (Hardback)
Trusted Platform Modules : Why, when and how to use them
Ariel (Security Architect and Trusted Computing Expert, Akamai Segall
Out of stock
Format: Book (Hardback)