Hello! Enter your postcode for delivery time
Track My Order
Help Centre
+61 2 88805247
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
    • FICTION

        Browse Fiction

      • New Releases
      • Bestselling
        • Popular Authors

        • Bryce Courtenay
        • Danielle Steel
        • Di Morrissey
        • Ian Fleming
        •  

        • J.K Rowling
        • J. R. R. Tolkien
        • James Patterson
        • Popular Subjects

        • Action & Adventure
        • Classic Fiction
        • Crime & Mystery
        • Fantasy Fiction
        • Historical Fiction
        •  

        • Horror & Ghost Stories
        • Modern & Contemporary Fiction
        • Romance
        • Thrillers & Suspense
      Explore All Fiction >
    • NON-FICTION
        • Subjects

        • Accounting & Finance
        • Animals & Nature
        • Antiques & Collectables
        • Archaeology
        • Arts & Entertainment
        • Biographies & True Stories
        • Business & Management
        •  

        • Children's Non-Fiction
        • Comedy & Humour
        • Computing & I.T.
        • Cooking, Food & Drink
        • Crafts & Handiwork
        • Dictionaries
        • Earth Sciences & Environment
        • Economics
        • Education
        •  

        • Engineering & Technology
        • Family & Health
        • Gardening
        • History
        • Hobbies, Games & Puzzles
        • Home & House Maintenance
        • Industry & Industrial Studies
        • Language & Linguistics
        •  

        • Law
        • Library & Info Sciences
        • Lifestyle & Fashion
        • Literature, Poetry & Plays
        • Mathematics
        • Medicine
        • Mind, Body, Spirit
        • Philosophy
        •  

        • Politics & Government
        • Psychology
        • Reference & Encyclopaedias
        • Religion & Beliefs
        • Science
        • Self-Help & Personal Development
        • Social Services & Welfare
        •  

        • Society & Culture
        • Sociology & Anthropology
        • Sports & Recreation
        • Teaching English (ELT)
        • Transportation
        • Travel & Holidays
        • Travel Maps & Atlases
        • Warfare & Defence
    • CHILDREN

        Browse Children's

      • New Releases
      • Bestselling
        • Popular Authors

        • Andy Griffiths
        • Enid Blyton
        • J.K Rowling
        • John Flanagan
        • Lemony Snicket
        • Stephaine Meyer
        • Popular Subjects

        • Action & Adventure
        • Children's Non-Fiction
        • Children's Classics
        • Crime & Mystery Fiction
        • Fairy Tales, Magical & Traditional Stories
        •  

        • Fantasy Fiction
        • General Fiction
        • Horror & Ghost Stories
        • Humorous Stories
        • Romance & Love Stories
        • Science Fiction
      Explore All Children's >
    • AUDIO CDS
    • AUDIO CD BARGAINS
    • Sony Headphones
Audiobooks > Non-Fiction > Computing & I.T. > Computer Security > Data Encryption
Get Free Shipping on orders over $79

Data Encryption

REFINE YOUR RESULTS

SUBJECTS

  • Computer Fraud & Hacking
  • Computer Viruses
  • Data Encryption
  • Privacy & Data Protection
  • Spyware

LISTS

  • All Books (394)
  • Books (7022)

PRICE

CUSTOMER RATING

  •  
    (1) 
  •  
    & Up (2) 
  •  
    & Up (2) 

LANGUAGE

  • Audiobook
    (394)
  • Books
    (7022)
  • eBooks
    (8587)
  • Audio CDs
    (2)
8587 Results | View 24 / 100
< 1 ... 8 9 10 11 12 ... 86 >
Sort By
Sort By:
  • Advances in Information Processing and Protection - Jerzy Pejas
    Advances in Information Processing and Protection
    Jerzy Pejas and ?Khalid Saeed
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Fighting Terror Online : The Convergence of Security, Technology, and the Law - Martin Charles Golumbic
    Fighting Terror Online
    The Convergence of Security, Technology, and th...
    Martin Charles Golumbic
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Vulnerability Analysis and Defense for the Internet - Abhishek Singh
    Vulnerability Analysis and Defense for the Internet
    Abhishek Singh
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Secure Multi-Party Non-Repudiation Protocols and Applications - José A. Onieva
    Secure Multi-Party Non-Repudiation Protocols and Applications
    José A. Onieva and Jianying Zhou
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Multimodal Processing and Interaction : Audio, Video, Text - Petros Maragos
    Multimodal Processing and Interaction
    Audio, Video, Text
    Petros Maragos, Alexandros Potamianos and Patrick Gros
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • RFID Security : Techniques, Protocols and System-On-Chip Design - Yan Zhang
    RFID Security
    Techniques, Protocols and System-On-Chip Design
    Yan Zhang and Paris Kitsos
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Intrusion Detection Systems - Roberto Di Pietro
    Intrusion Detection Systems
    Roberto Di Pietro and ?Luigi V. Mancini
    eText
    Instant Online Reading*
    $249.00
    BUY EBOOK
  • Primality Testing and Integer Factorization in Public-Key Cryptography - Song Y. Yan
    Primality Testing and Integer Factorization in Public-Key Cryptography
    Song Y. Yan
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Insider Attack and Cyber Security : Beyond the Hacker - Salvatore Stolfo
    Insider Attack and Cyber Security
    Beyond the Hacker
    Salvatore Stolfo, Steven M. Bellovin and Angelos D. Keromytis
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Open Source Systems Security Certification - Ernesto Damiani
    Open Source Systems Security Certification
    Ernesto Damiani, Claudio Agostino Ardagna and Nabil El Ioini
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Biometric System and Data Analysis : Design, Evaluation, and Data Mining - Ted Dunstone
    Biometric System and Data Analysis
    Design, Evaluation, and Data Mining
    Ted Dunstone and Neil Yager
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • An Introduction to Mathematical Cryptography - Jeffrey Hoffstein
    An Introduction to Mathematical Cryptography
    Jeffrey Hoffstein
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security Governance - S.H. Solms
    Information Security Governance
    S.H. Solms and Rossouw Solms
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • High Assurance Services Computing - Jing Dong
    High Assurance Services Computing
    Jing Dong, Raymond Paul and LiangJie Zhang
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Secure Key Establishment - Kim-Kwang Raymond Choo
    Secure Key Establishment
    Kim-Kwang Raymond Choo
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Securing Emerging Wireless Systems : Lower-layer Approaches - Yingying Chen
    Securing Emerging Wireless Systems
    Lower-layer Approaches
    Yingying Chen, Wenyuan Xu, Wade Trappe and YanYong Zhang
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Machine Learning in Cyber Trust : Security, Privacy, and Reliability - Jeffrey J. P. Tsai
    Machine Learning in Cyber Trust
    Security, Privacy, and Reliability
    Jeffrey J. P. Tsai and Philip S. Yu
    eText
    Instant Online Reading*
    $249.00
    BUY EBOOK
  • Security and Dependability for Ambient Intelligence - George Spanoudakis
    Security and Dependability for Ambient Intelligence
    George Spanoudakis and ?Spyros Kokolakis
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Identifying Malicious Code Through Reverse Engineering - Abhishek Singh
    Identifying Malicious Code Through Reverse Engineering
    Abhishek Singh
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations : Information warfare; social, legal, and international issues; and security foundations - Hossein Bidgoli
    Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations
    Information warfare; social, legal, and interna...
    Hossein Bidgoli
    eText
    Instant Online Reading*
    $621.49
    BUY EBOOK
  • Prime Numbers and Computer Methods for Factorization : Modern Birkhäuser Classics - Hans Riesel
    Prime Numbers and Computer Methods for Factorization
    Modern Birkhäuser Classics
    Hans Riesel
    eText
    Instant Online Reading*
    $129.00
    BUY EBOOK
  • Legislating Privacy : Technology, Social Values, and Public Policy - Priscilla M. Regan
    Legislating Privacy
    Technology, Social Values, and Public Policy
    Priscilla M. Regan
    eBook
    Instant Digital Delivery
    RRP $50.82
    $45.99
    BUY EBOOK
  • Economics of Identity Theft : Avoidance, Causes and Possible Cures - L. Jean Camp
    Economics of Identity Theft
    Avoidance, Causes and Possible Cures
    L. Jean Camp
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Scammed : How to Save Your Money and Find Better Service in a World of Schemes, Swindles, and Shady Deals - Christopher Elliott
    Scammed
    How to Save Your Money and Find Better Service ...
    Christopher Elliott
    eBook
    Instant Digital Delivery
    $26.99
    BUY EBOOK
  • Guide to Biometrics for Large-Scale Systems : Technological, Operational, and User-Related Factors - Julian Ashbourn
    Guide to Biometrics for Large-Scale Systems
    Technological, Operational, and User-Related Fa...
    Julian Ashbourn
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Transparent User Authentication : Biometrics, RFID and Behavioural Profiling - Nathan Clarke
    Transparent User Authentication
    Biometrics, RFID and Behavioural Profiling
    Nathan Clarke
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Handbook of Face Recognition : Computer Science (R0) - Stan Z. Li
    Handbook of Face Recognition
    Computer Science (R0)
    Stan Z. Li and Anil K. Jain
    eText
    Instant Online Reading*
    $249.00
    BUY EBOOK
  • Statistical Confidentiality : Principles and Practice - George T. Duncan
    Statistical Confidentiality
    Principles and Practice
    George T. Duncan, Mark Elliot and Gonzalez Juan Jose Salazar
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Introduction to Hardware Security and Trust - Mohammad Tehranipoor
    Introduction to Hardware Security and Trust
    Mohammad Tehranipoor and ?Cliff Wang
    eText
    Instant Online Reading*
    $179.00
    BUY EBOOK
  • Dynamic Mixed Models for Familial Longitudinal Data : Dynamic Mixed Models for Familial Longitudinal Data - Brajendra C. Sutradhar
    Dynamic Mixed Models for Familial Longitudinal Data
    Dynamic Mixed Models for Familial Longitudinal ...
    Brajendra C. Sutradhar
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Identity-Based Encryption - Sanjit Chatterjee
    Identity-Based Encryption
    Sanjit Chatterjee and Palash Sarkar
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Mobile Computing : Securing your workforce - BCS The Chartered Institute For IT
    Mobile Computing
    Securing your workforce
    BCS The Chartered Institute For IT
    eText
    Instant Online Reading*
    $5.92
    BUY EBOOK
  • Cloud computing : Moving IT out of the office - BCS The Chartered Institute For IT
    Cloud computing
    Moving IT out of the office
    BCS The Chartered Institute For IT
    eText
    Instant Online Reading*
    $5.92
    BUY EBOOK
  • Bring Your Own Device (BYOD) : The mobile computing challenge - BCS The Chartered Institute For IT
    Bring Your Own Device (BYOD)
    The mobile computing challenge
    BCS The Chartered Institute For IT
    eText
    Instant Online Reading*
    $5.92
    BUY EBOOK
  • The Browser Hacker's Handbook - Wade Alcorn
    The Browser Hacker's Handbook
    Wade Alcorn, Christian Frichot and Michele Orru
    eBook
    Instant Digital Delivery
    $76.99
    BUY EBOOK
  • Security Consulting - Charles A. Sennewald
    Security Consulting
    Charles A. Sennewald
    eText
    Instant Online Reading*
    $58.99
    BUY EBOOK
  • UTM Security with Fortinet : Mastering FortiOS - Kenneth Tam
    UTM Security with Fortinet
    Mastering FortiOS
    Kenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile and Josh More
    eText
    Instant Online Reading*
    $64.94
    BUY EBOOK
  • The Basics of Cyber Warfare : Understanding the Fundamentals of Cyber Warfare in Theory and Practice - Steve Winterfeld
    The Basics of Cyber Warfare
    Understanding the Fundamentals of Cyber Warfare...
    Steve Winterfeld and Jason Andress
    eText
    Instant Online Reading*
    $34.95
    BUY EBOOK
  • Augmented Reality : An Emerging Technologies Guide to AR - Greg Kipper
    Augmented Reality
    An Emerging Technologies Guide to AR
    Greg Kipper and Joseph Rampolla
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Data Hiding : Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols - Michael T. Raggo
    Data Hiding
    Exposing Concealed Data in Multimedia, Operatin...
    Michael T. Raggo and Chet Hosmer
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Advanced Persistent Threat : Understanding the Danger and How to Protect Your Organization - Eric Cole
    Advanced Persistent Threat
    Understanding the Danger and How to Protect You...
    Eric Cole
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Violent Python : A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers - TJ O'Connor
    Violent Python
    A Cookbook for Hackers, Forensic Analysts, Pene...
    TJ O'Connor
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • FISMA and the Risk Management Framework : The New Practice of Federal Cyber Security - Stephen D. Gantz
    FISMA and the Risk Management Framework
    The New Practice of Federal Cyber Security
    Stephen D. Gantz and Daniel R. Philpott
    eText
    Instant Online Reading*
    $82.95
    BUY EBOOK
  • The Hacker's Guide to OS X : Exploiting OS X from the Root Up - Robert Bathurst
    The Hacker's Guide to OS X
    Exploiting OS X from the Root Up
    Robert Bathurst, Russ Rogers and Alijohn Ghassemlouei
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Security and Loss Prevention : An Introduction - Philip Purpura
    Security and Loss Prevention
    An Introduction
    Philip Purpura
    eText
    Instant Online Reading*
    $88.99
    BUY EBOOK
  • Intelligent Systems for Security Informatics - Christopher C Yang
    Intelligent Systems for Security Informatics
    Christopher C Yang, Wenji Mao, Xiaolong Zheng and Hui Wang
    eText
    Instant Online Reading*
    $147.95
    BUY EBOOK
  • Logging and Log Management : The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and other IT 'Noise' - Anton Chuvakin
    Logging and Log Management
    The Authoritative Guide to Dealing with Syslog,...
    Anton Chuvakin, Kevin Schmidt and Chris Phillips
    eText
    Instant Online Reading*
    $59.95
    BUY EBOOK
  • Federal Cloud Computing : The Definitive Guide for Cloud Service Providers - Matthew Metheny
    Federal Cloud Computing
    The Definitive Guide for Cloud Service Providers
    Matthew Metheny
    eText
    Instant Online Reading*
    $82.95
    BUY EBOOK
  • Windows 2012 Server Network Security : Securing Your Windows Network Systems and Infrastructure - Derrick Rountree
    Windows 2012 Server Network Security
    Securing Your Windows Network Systems and Infra...
    Derrick Rountree
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Blackhatonomics : An Inside Look at the Economics of Cybercrime - Will Gragido
    Blackhatonomics
    An Inside Look at the Economics of Cybercrime
    Will Gragido, Daniel Molina, John Pirc and Nick Selby
    eText
    Instant Online Reading*
    $46.95
    BUY EBOOK
  • Computer Viruses and Malware - John Aycock
    Computer Viruses and Malware
    John Aycock
    eText
    Instant Online Reading*
    $209.00
    BUY EBOOK
  • Understanding High-Dimensional Spaces - David B. Skillicorn
    Understanding High-Dimensional Spaces
    David B. Skillicorn
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Forensic Computing - Anthony Sammes
    Forensic Computing
    Anthony Sammes and Brian Jenkinson
    eText
    Instant Online Reading*
    $119.00
    BUY EBOOK
  • Computer Network Security - Joseph Migga Kizza
    Computer Network Security
    Joseph Migga Kizza
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Foundations of Computer Security - David Salomon
    Foundations of Computer Security
    David Salomon
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Algebraic Aspects of the Advanced Encryption Standard - Carlos Cid
    Algebraic Aspects of the Advanced Encryption Standard
    Carlos Cid, Sean Murphy and Matthew Robshaw
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Ethical and Social Issues in the Information Age : Computer Science (R0) - Joseph Migga Kizza
    Ethical and Social Issues in the Information Age
    Computer Science (R0)
    Joseph Migga Kizza
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Complexity Theory and Cryptology : An Introduction to Cryptocomplexity - Jörg Rothe
    Complexity Theory and Cryptology
    An Introduction to Cryptocomplexity
    Jörg Rothe
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cryptographic Protocol : Security Analysis Based on Trusted Freshness - Ling Dong
    Cryptographic Protocol
    Security Analysis Based on Trusted Freshness
    Ling Dong and Kefei Chen
    eText
    Instant Online Reading*
    $269.01
    BUY EBOOK
  • Information Technology Convergence, Secure and Trust Computing, and Data Management : ITCS 2012 & STA 2012 - Jong Hyuk (James) Park
    Information Technology Convergence, Secure and Trust Computing, and Data Management
    ITCS 2012 & STA 2012
    Jong Hyuk (James) Park
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Trustworthy Ubiquitous Computing - Ismail. Khalil
    Trustworthy Ubiquitous Computing
    Ismail. Khalil and Teddy. Mantoro
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Protecting Airline Passengers in the Age of Terrorism - Paul Seidenstat and Francis X. Splane
    Protecting Airline Passengers in the Age of Terrorism
    Paul Seidenstat and Francis X. Splane
    eText
    Instant Online Reading*
    $90.00
    BUY EBOOK
  • Cybercrime : Criminal Threats from Cyberspace - Susan W. Brenner
    Cybercrime
    Criminal Threats from Cyberspace
    Susan W. Brenner
    eText
    Instant Online Reading*
    $68.40
    BUY EBOOK
  • Emergency Notification - Robert C. Chandler
    Emergency Notification
    Robert C. Chandler
    eText
    Instant Online Reading*
    $66.59
    BUY EBOOK
  • Protecting Your Health Privacy : A Citizen's Guide to Safeguarding the Security of Your Medical Information - Jacqueline Klosek
    Protecting Your Health Privacy
    A Citizen's Guide to Safeguarding the Security ...
    Jacqueline Klosek
    eText
    Instant Online Reading*
    $68.40
    BUY EBOOK
  • Network Intrusion Analysis : Methodologies, Tools, and Techniques for Incident Analysis and Response - Joe Fichera
    Network Intrusion Analysis
    Methodologies, Tools, and Techniques for Incide...
    Joe Fichera and Steven Bolt
    eText
    Instant Online Reading*
    $64.94
    BUY EBOOK
  • Mobile Phone Security and Forensics : A Practical Approach - Iosif I. Androulidakis
    Mobile Phone Security and Forensics
    A Practical Approach
    Iosif I. Androulidakis
    eBook (PDF)
    Instant Digital Delivery
    RRP $84.99
    $76.99
    BUY EBOOK
  • PBX Security and Forensics : A Practical Approach - I. I. Androulidakis
    PBX Security and Forensics
    A Practical Approach
    I. I. Androulidakis
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • A Survey of Data Leakage Detection and Prevention Solutions : SpringerBriefs in Computer Science - Asaf Shabtai
    A Survey of Data Leakage Detection and Prevention Solutions
    SpringerBriefs in Computer Science
    Asaf Shabtai, Yuval Elovici and Lior Rokach
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Wireless Reconnaissance in Penetration Testing : Using Scanners to Monitor Radios during Penetration Tests - Matthew Neely
    Wireless Reconnaissance in Penetration Testing
    Using Scanners to Monitor Radios during Penetra...
    Matthew Neely, Alex Hamerstone and Chris Sanyk
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • The Oracle Hacker's Handbook : Hacking and Defending Oracle - David Litchfield
    The Oracle Hacker's Handbook
    Hacking and Defending Oracle
    David Litchfield
    eText
    Instant Online Reading*
    $65.99
    BUY EBOOK
  • The e-Policy Handbook : Rules and Best Practices to Safely Manage Your Company's E-Mail, Blogs, Social Networking, and Other Electronic Communication T - Nancy FLYNN
    The e-Policy Handbook
    Rules and Best Practices to Safely Manage Your ...
    Nancy FLYNN
    eBook
    Instant Digital Delivery
    $12.99
    BUY EBOOK
  • Applied Cryptanalysis: Breaking Ciphers in the Real World : Breaking Ciphers in the Real World - Mark Stamp
    Applied Cryptanalysis: Breaking Ciphers in the Real World
    Breaking Ciphers in the Real World
    Mark Stamp and Richard M. Low
    eText
    Instant Online Reading*
    $201.29
    BUY EBOOK
  • IT Security Interviews Exposed : Secrets to Landing Your Next Information Security Job - Chris Butler
    IT Security Interviews Exposed
    Secrets to Landing Your Next Information Securi...
    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles and Brian Ki
    eText
    Instant Online Reading*
    $36.29
    BUY EBOOK
  • Cybercrime : Digital Cops in a Networked Environment - Jack M Balkin
    Cybercrime
    Digital Cops in a Networked Environment
    Jack M Balkin, James Grimmelmann, Eddan Katz and Nimrod Kozlovski
    eText
    Instant Online Reading*
    $53.16
    My Library BUY EBOOK
  • Information Processing and Security Systems - Khalid Saeed
    Information Processing and Security Systems
    Khalid Saeed and ?Jerzy Pejas
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Preserving Privacy in On-Line Analytical Processing (OLAP) - Lingyu Wang
    Preserving Privacy in On-Line Analytical Processing (OLAP)
    Lingyu Wang, Sushil Jajodia and Duminda Wijesekera
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Computer Insecurity : Risking the System - Steven M. Furnell
    Computer Insecurity
    Risking the System
    Steven M. Furnell
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Guide to Wireless Network Security - John R. Vacca
    Guide to Wireless Network Security
    John R. Vacca
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • ISSE 2008 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2008 Conference - Norbert Pohlmann
    ISSE 2008 Securing Electronic Business Processes
    Highlights of the Information Security Solution...
    Norbert Pohlmann, Helmut Reimer and Wolfgang Schneider
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security Risk Assessment Toolkit : Practical Assessments through Data Collection and Data Analysis - Mark Talabis
    Information Security Risk Assessment Toolkit
    Practical Assessments through Data Collection a...
    Mark Talabis and Jason Martin
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Computer and Information Security Handbook - John R. Vacca
    Computer and Information Security Handbook
    John R. Vacca
    eText
    Instant Online Reading*
    $153.99
    BUY EBOOK
  • The Basics of Cloud Computing : Understanding the Fundamentals of Cloud Computing in Theory and Practice - Derrick Rountree
    The Basics of Cloud Computing
    Understanding the Fundamentals of Cloud Computi...
    Derrick Rountree and Ileana Castrillo
    eText
    Instant Online Reading*
    $34.95
    BUY EBOOK
  • Placing the Suspect Behind the Keyboard : Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects - Brett Shavers
    Placing the Suspect Behind the Keyboard
    Using Digital Forensics and Investigative Techn...
    Brett Shavers
    eText
    Instant Online Reading*
    $70.95
    BUY EBOOK
  • Information Security Governance : A Practical Development and Implementation Approach - Krag Brotby
    Information Security Governance
    A Practical Development and Implementation Appr...
    Krag Brotby
    eBook
    Instant Digital Delivery
    $146.99
    BUY EBOOK
  • Business Cyberbullies and How To Fight Back : Business Series - Debbie Elicksen
    Business Cyberbullies and How To Fight Back
    Business Series
    Debbie Elicksen
    eBook
    Instant Digital Delivery
    RRP $13.19
    $10.99
    17%
    OFF
    BUY EBOOK
  • Digital Jihad : Palestinian Resistance in the Digital Era - Erik Skare
    Digital Jihad
    Palestinian Resistance in the Digital Era
    Erik Skare
    eBook
    Instant Digital Delivery
    RRP $33.29
    $30.99
    BUY EBOOK
  • The Ultimate GDPR Practitioner Guide : Demystifying Privacy & Data Protection - Stephen R Massey
    The Ultimate GDPR Practitioner Guide
    Demystifying Privacy & Data Protection
    Stephen R Massey
    eBook
    Instant Digital Delivery
    RRP $42.89
    $38.99
    My Library BUY EBOOK
  • Introduction to Secure Outsourcing Computation : Synthesis Lectures on Information Security, Privacy, and Trust - Xiaofeng Chen
    Introduction to Secure Outsourcing Computation
    Synthesis Lectures on Information Security, Pri...
    Xiaofeng Chen
    eBook
    Instant Digital Delivery
    RRP $59.31
    $53.99
    BUY EBOOK
  • Database Anonymization : Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections - David Sánchez
    Database Anonymization
    Privacy Models, Data Utility, and Microaggregat...
    David Sánchez, Josep Domingo-Ferrer and Jordi Soria-Comas
    eBook
    Instant Digital Delivery
    RRP $61.00
    $54.99
    BUY EBOOK
  • Privacy Risk Analysis : Synthesis Lectures on Information Security, Privacy, and Trust - Daniel Le Métayer
    Privacy Risk Analysis
    Synthesis Lectures on Information Security, Pri...
    Daniel Le Métayer and Sourya Joyee De
    eBook
    Instant Digital Delivery
    RRP $67.78
    $61.99
    BUY EBOOK
  • Digital Forensic Science : Issues, Methods, and Challenges - Ravi Sandhu
    Digital Forensic Science
    Issues, Methods, and Challenges
    Ravi Sandhu, Elisa Bertino and Vassil Roussev
    eBook
    Instant Digital Delivery
    RRP $67.78
    $61.99
    BUY EBOOK
  • Blocks and Chains : Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms - Ravi Sandhu
    Blocks and Chains
    Introduction to Bitcoin, Cryptocurrencies, and ...
    Ravi Sandhu, Aljosha Judmayer, Elisa Bertino, Katharina Krombholz and Edgar Weippl
    eBook
    Instant Digital Delivery
    RRP $54.16
    $48.99
    BUY EBOOK
  • Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications - Houbing Song
    Security and Privacy in Cyber-Physical Systems
    Foundations, Principles, and Applications
    Houbing Song, Glenn A. Fink and Sabina Jeschke
    eText
    Instant Online Reading*
    $189.19
    BUY EBOOK
  • Candidate Multilinear Maps : ACM Books - Sanjam Garg
    Candidate Multilinear Maps
    ACM Books
    Sanjam Garg
    eBook
    Instant Digital Delivery
    RRP $69.46
    $62.99
    BUY EBOOK
  • Network Security : A Practical Guide - Owen Poole
    Network Security
    A Practical Guide
    Owen Poole
    eText
    Instant Online Reading*
    $118.80
    BUY EBOOK
  • Security Architect : Careers in information security - Jon Collins
    Security Architect
    Careers in information security
    Jon Collins
    eText
    Instant Online Reading*
    $35.63
    BUY EBOOK
  • Cloud Security : A Comprehensive Guide to Secure Cloud Computing - Ronald L. Krutz
    Cloud Security
    A Comprehensive Guide to Secure Cloud Computing
    Ronald L. Krutz and Russell Dean Vines
    eBook
    Instant Digital Delivery
    $66.99
    BUY EBOOK
  • Data-Driven Security : Analysis, Visualization and Dashboards - Jay Jacobs
    Data-Driven Security
    Analysis, Visualization and Dashboards
    Jay Jacobs
    eText
    Instant Online Reading*
    $73.69
    BUY EBOOK
  • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory : Detecting Malware and Threats in Windows, Linux, and Mac Memory - Michael Hale Ligh
    The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
    Detecting Malware and Threats in Windows, Linux...
    Michael Hale Ligh, Andrew Case, Jamie Levy and AAron Walters
    eText
    Instant Online Reading*
    $101.19
    BUY EBOOK
8587 Results | View 24 / 100
< 1 ... 8 9 10 11 12 ... 86 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW