Showing 24 - 48 (of 418)
Refine
Building Machine Learning Pipelines - Book

Building Machine Learning Pipelines

Hannes Hapke

Format: Book (Paperback / softback)

£63.99

£38.54

Book (Paperback / softback)

Add to Basket
Threats : What Every Engineer Should Learn From Star Wars - Book

Threats : What Every Engineer Should Learn From Star Wars

Adam Shostack

Format: Book (Paperback / softback)

£18.99

£13.41

Book (Paperback / softback)

Add to Basket
Introduction to Machine Learning with Applications in Information Security - Book

Introduction to Machine Learning with Applications in Information Security

Mark Stamp

Format: Book (Hardback)

£56.99

£48.55

Book (Hardback)

Add to Basket
The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice - Book

The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice

Jason (CISSP, ISSAP, CISM, GPEN) Andress

Format: Book (Paperback / softback)

£23.99

£16.17

Book (Paperback / softback)

Add to Basket
Arista Warrior : Arista Products with a Focus on EOS - Book

Arista Warrior : Arista Products with a Focus on EOS

Gary A. Donahue

Format: Book (Paperback / softback)

£63.99

£38.82

Book (Paperback / softback)

Add to Basket
Information Privacy Engineering and Privacy by Design : Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices - Book

£51.99

£41.65

Book (Paperback / softback)

Add to Basket
The Virtual Weapon and International Order - Book

The Virtual Weapon and International Order

Lucas Kello

Format: Book (Paperback / softback)

£14.77

Book (Paperback / softback)

Add to Basket
The Tangled Web - Book

The Tangled Web

Michal Zalewski

Format: Book (Paperback / softback)

£56.99

£36.50

Book (Paperback / softback)

Add to Basket
Computer Security and the Internet : Tools and Jewels from Malware to Bitcoin - Book

Computer Security and the Internet : Tools and Jewels from Malware to Bitcoin

Paul C. van Oorschot

Format: Book (Hardback)

£54.99

£40.53

Book (Hardback)

Add to Basket
Integrated Security Technologies and Solutions - Volume II : Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization - Book

£59.99

£47.31

Book (Paperback / softback)

Add to Basket
CEH Certified Ethical Hacker Cert Guide - Book

CEH Certified Ethical Hacker Cert Guide

Michael Gregg

Format: Book (Multiple-component retail product)

£45.89

£45.20

Book (Multiple-component retail product)

Add to Basket
Beginning Ethical Hacking with Kali Linux : Computational Techniques for Resolving Security Issues - Book

Beginning Ethical Hacking with Kali Linux : Computational Techniques for Resolving Security Issues

Sanjib Sinha

Format: Book (Paperback / softback)

£64.99

£46.73

Book (Paperback / softback)

Add to Basket
Ransomware Protection Playbook - Book

Ransomware Protection Playbook

Roger A. Grimes

Format: Book (Paperback / softback)

£21.99

£15.15

Book (Paperback / softback)

Add to Basket
Hands-On Ethical Hacking and Network Defense - Book

Hands-On Ethical Hacking and Network Defense

Rob (Willis College of Business, Healthcare and Technology) Wilson

Format: Book (Paperback / softback)

£49.99

£46.13

Book (Paperback / softback)

Add to Basket
Information Security Governance : Framework and Toolset for CISOs and Decision Makers - Book

Information Security Governance : Framework and Toolset for CISOs and Decision Makers

Andrej Volchkov

Format: Book (Paperback / softback)

£56.99

£47.76

Book (Paperback / softback)

Add to Basket
The IoT Hacker's Handbook : A Practical Guide to Hacking the Internet of Things - Book

The IoT Hacker's Handbook : A Practical Guide to Hacking the Internet of Things

Aditya Gupta

Format: Book (Paperback / softback)

£49.99

£37.00

Book (Paperback / softback)

Add to Basket
Solving Identity Management in Modern Applications : Demystifying OAuth 2, OpenID Connect, and SAML 2 - Book

Solving Identity Management in Modern Applications : Demystifying OAuth 2, OpenID Connect, and SAML 2

Yvonne Wilson

Format: Book (Paperback / softback)

£54.99

£40.53

Book (Paperback / softback)

Add to Basket
Cyber Threats and Nuclear Weapons - Book

Cyber Threats and Nuclear Weapons

Herbert Lin

Format: Book (Paperback / softback)

£21.99

£17.62

Book (Paperback / softback)

Add to Basket
Practical Python Security - Book

Practical Python Security

Dennis Byrne

Format: Book (Paperback / softback)

£47.99

£38.53

Book (Paperback / softback)

Add to Basket
Enterprise Cybersecurity Study Guide : How to Build a Successful Cyberdefense Program Against Advanced Threats - Book

Enterprise Cybersecurity Study Guide : How to Build a Successful Cyberdefense Program Against Advanced Threats

Scott E. Donaldson

Format: Book (Paperback / softback)

£64.99

£47.01

Book (Paperback / softback)

Add to Basket
Interperetable AI - Book

Interperetable AI

Ajay Thampi

Format: Book (Paperback / softback)

£37.99

£36.47

Book (Paperback / softback)

Add to Basket
Security Without Obscurity : A Guide to PKI Operations - Book

Security Without Obscurity : A Guide to PKI Operations

Jeff Stapleton

Format: Book (Paperback / softback)

£44.99

£39.07

Book (Paperback / softback)

Add to Basket
Protecting Information Assets and IT Infrastructure in the Cloud - Book

Protecting Information Assets and IT Infrastructure in the Cloud

Ravi Das

Format: Book (Paperback / softback)

£44.99

£39.07

Book (Paperback / softback)

Add to Basket
Information Security Applications : 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers - Book

£59.99

£43.77

Book (Paperback / softback)

Add to Basket
Showing 24 - 48 (of 418)
Refine