Network Security

Sort these publications by...

Results Found

Introduction to Machine Learning with Applications in Information Security

Introduction to Machine Learning with Applications in Information Security

  • Author: Stamp, Mark

Not yet published: available to order Availability help (opens in new window)

Cyber Security: A practitioner's guide

Cyber Security: A practitioner's guide

  • Author: Sutton, David

Not yet published: available to order Availability help (opens in new window)

Cisco ISE for BYOD and Secure Unified Access

NewCisco ISE for BYOD and Secure Unified Access

  • Author: Woland, Aaron Heary, Jamey ...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Cyber Survival Manual: From Identity Theft to the Digital Apocalypse and Everything in Between

NewCyber Survival Manual: From Identity Theft to the Digital Apocalypse and Everything in Between

  • Author: Selby, Nick Vescent, Heather ...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Social Media Warfare: Equal Weapons for All

NewSocial Media Warfare: Equal Weapons for All

  • Author: Erbschloe, Michael

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Iso27001/Iso27002: Una Guia de Bolsillo

NewIso27001/Iso27002: Una Guia de Bolsillo

  • Author: Calder, Alan

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Nueve Pasos Para El Exito: Una Vision de Conjunto Para La Aplicacion de La ISO 27001:2013

NewNueve Pasos Para El Exito: Una Vision de Conjunto Para La Aplicacion de La ISO 27001:2013

  • Author: Calder, Alan

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Information Security and Privacy: 2017: Part I

Information Security and Privacy: 2017: Part I

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Information Security and Privacy: 2017: Part I

Information Security and Privacy: 2017: Part I

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Security Breaches and Threat Prevention in the Internet of Things