Decentralizing Finance : How DeFi, Digital Assets, and Distributed Ledger Technology Are Transforming Finance
Kenneth (Imperial College London, UK; California Institute of Int Bok
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
The Code of Honor : Embracing Ethics in Cybersecurity
Paul J. Maurer
Pre-Order
Format: Book (Hardback)
Secure Public Key Infrastructure : Standards, PGP and Beyond
Yvo G. Desmedt
Pre-Order
Format: Book (Hardback)
Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications
Adarsh Kumar
Out of stock
Format: Book (Hardback)
Understanding Cryptography : From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
Christof Paar
Out of stock
Format: Book (Hardback)
Pegasus : The Story of the World's Most Dangerous Spyware
Laurent Richard
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Enterprise Security Architecture : A Business-Driven Approach
Nicholas Sherwood
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Applied Cryptography : Protocols, Algorithms and Source Code in C
Bruce Schneier
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Cryptography Made Simple
Nigel Smart
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Enterprise Security Architecture : A Business-Driven Approach
Nicholas Sherwood
Download - Immediately Available
Format: eBook (EPUB)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
Henri (Universite Bordeaux I, France) Cohen
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Enterprise Security Architecture : A Business-Driven Approach
Nicholas Sherwood
Download - Immediately Available
Format: eBook (PDF)
Exploding Data : Reclaiming Our Cyber Security in the Digital Age
Michael Chertoff
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
PRAGMATIC Security Metrics : Applying Metametrics to Information Security
W. Krag, CISM (Enterprise Security Architect, Thousand Oaks, C Brotby
Download - Immediately Available
Format: eBook (PDF)
The Official (ISC)2 CCSP CBK Reference
Aaron Kraus
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Complete Guide to CISM Certification
Thomas R. (Thomas R. Peltier Associates, LLC, Wyandotte, Mich Peltier
Download - Immediately Available
Format: eBook (PDF)
The CISO Evolution : Business Knowledge for Cybersecurity Executives
Matthew K. Sharp
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Forensic Computing
Anthony Sammes
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®
Susan Hansche
In Stock - usually despatched within 24 hours
Format: Book (Hardback)
Cryptography : Theory and Practice
Douglas Robert (University of Waterloo, Ontario, Canada) Stinson
Download - Immediately Available
Format: eBook (PDF)
At Large : The Strange Case of the World's Biggest Internet Invasion
Charles C. Mann
Download - Immediately Available
Format: eBook (EPUB)
Cyber Forensics : A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Jr., Albert Marcella
Download - Immediately Available
Format: eBook (PDF)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
Practical Cryptography : Algorithms and Implementations Using C++
Saiful Azad
Download - Immediately Available
Format: eBook (PDF)