Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Showing 1 - 24 (of 81)
Refine
Cyber Warfare : A Reference Handbook - Book

£55.00

Book (Hardback)

Pre-Order
Industrial Network Security : Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems - Book

£54.99

£52.39

Book (Paperback / softback)

Add to Basket
Foundational Cybersecurity Research : Improving Science, Engineering, and Institutions - eBook

£2.99

£2.84

eBook (PDF)

Add to Basket
Decrypting the Encryption Debate : A Framework for Decision Makers - eBook

£2.99

£2.84

eBook (PDF)

Add to Basket
Guide to Computer Forensics and Investigations - Book

Guide to Computer Forensics and Investigations

Bill (IT Forensics, Inc.) Nelson

Format: Book (Paperback / softback)

£81.99

Book (Paperback / softback)

Add to Basket
Hardware Security : A Hands-on Learning Approach - Book

Hardware Security : A Hands-on Learning Approach

Swarup (Department of Electrical and Computer Engineering, Uni Bhunia

Format: Book (Paperback / softback)

£74.99

£73.25

Book (Paperback / softback)

Add to Basket
At the Nexus of Cybersecurity and Public Policy : Some Basic Concepts and Issues - eBook

£2.99

£2.84

eBook (PDF)

Add to Basket
Pen Testing from Contract to Report - Book

Pen Testing from Contract to Report

Alfred (ISACA; ECE;Mathematical Association of America) Basta

Format: Book (Hardback)

£74.95

£72.35

Book (Hardback)

Add to Basket
Transactions on Data Hiding and Multimedia Security VII - Book

Transactions on Data Hiding and Multimedia Security VII

Yun Qing Shi

Format: Book (Paperback / softback)

£62.99

£52.35

Book (Paperback / softback)

Item not Available
Transactions on Data Hiding and Multimedia Security II - Book

Transactions on Data Hiding and Multimedia Security II

Yun Q. Shi

Format: Book (Paperback / softback)

£62.99

£52.35

Book (Paperback / softback)

Item not Available
Guide to Computer Forensics and Investigations - Book

Guide to Computer Forensics and Investigations

Amelia (Highline Community College) Phillips

Format: Book (Multiple-component retail product)

£97.99

Book (Multiple-component retail product)

Add to Basket
Private Lives and Public Policies : Confidentiality and Accessibility of Government Statistics - eBook

£69.60

£62.64

eBook (PDF)

Add to Basket
Security Controls Evaluation, Testing, and Assessment Handbook - Book

Security Controls Evaluation, Testing, and Assessment Handbook

Leighton (CTO and Senior Security Engineer for Information Se Johnson

Format: Book (Paperback / softback)

£55.00

Book (Paperback / softback)

Add to Basket
Investigating Windows Systems - Book

Investigating Windows Systems

Harlan (DFIR analyst, presenter, and open-source tool author) Carvey

Format: Book (Paperback / softback)

£53.95

Book (Paperback / softback)

Add to Basket
Protecting Individual Privacy in the Struggle Against Terrorists : A Framework for Program Assessment - eBook

£65.99

£59.39

eBook (EPUB)

Add to Basket
Security Controls Evaluation, Testing, and Assessment Handbook - Book

Security Controls Evaluation, Testing, and Assessment Handbook

Leighton (CTO and Senior Security Engineer for Information Se Johnson

Format: Book (Paperback / softback)

£76.95

Book (Paperback / softback)

Add to Basket
Effective Security Management - Book

£59.00

£56.09

Book (Hardback)

Add to Basket
Implications of Artificial Intelligence for Cybersecurity : Proceedings of a Workshop - eBook

£65.99

£59.39

eBook (EPUB)

Add to Basket
Leading the Internal Audit Function - Book

Leading the Internal Audit Function

Lynn (Consulting, Business Advisory and Training, Overland P Fountain

Format: Book (Hardback)

£62.99

Book (Hardback)

Add to Basket
Showing 1 - 24 (of 81)
Refine