Hello! Enter your postcode for delivery time
Track My Order
Help Centre
+61 2 88805247
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
    • FICTION

        Browse Fiction

      • New Releases
      • Bestselling
        • Popular Authors

        • Bryce Courtenay
        • Danielle Steel
        • Di Morrissey
        • Ian Fleming
        •  

        • J.K Rowling
        • J. R. R. Tolkien
        • James Patterson
        • Popular Subjects

        • Action & Adventure
        • Classic Fiction
        • Crime & Mystery
        • Fantasy Fiction
        • Historical Fiction
        •  

        • Horror & Ghost Stories
        • Modern & Contemporary Fiction
        • Romance
        • Thrillers & Suspense
      Explore All Fiction >
    • NON-FICTION
        • Subjects

        • Accounting & Finance
        • Animals & Nature
        • Antiques & Collectables
        • Archaeology
        • Arts & Entertainment
        • Biographies & True Stories
        • Business & Management
        •  

        • Children's Non-Fiction
        • Comedy & Humour
        • Computing & I.T.
        • Cooking, Food & Drink
        • Crafts & Handiwork
        • Dictionaries
        • Earth Sciences & Environment
        • Economics
        • Education
        •  

        • Engineering & Technology
        • Family & Health
        • Gardening
        • History
        • Hobbies, Games & Puzzles
        • Home & House Maintenance
        • Industry & Industrial Studies
        • Language & Linguistics
        •  

        • Law
        • Library & Info Sciences
        • Lifestyle & Fashion
        • Literature, Poetry & Plays
        • Mathematics
        • Medicine
        • Mind, Body, Spirit
        • Philosophy
        •  

        • Politics & Government
        • Psychology
        • Reference & Encyclopaedias
        • Religion & Beliefs
        • Science
        • Self-Help & Personal Development
        • Social Services & Welfare
        •  

        • Society & Culture
        • Sociology & Anthropology
        • Sports & Recreation
        • Teaching English (ELT)
        • Transportation
        • Travel & Holidays
        • Travel Maps & Atlases
        • Warfare & Defence
    • CHILDREN

        Browse Children's

      • New Releases
      • Bestselling
        • Popular Authors

        • Andy Griffiths
        • Enid Blyton
        • J.K Rowling
        • John Flanagan
        • Lemony Snicket
        • Stephaine Meyer
        • Popular Subjects

        • Action & Adventure
        • Children's Non-Fiction
        • Children's Classics
        • Crime & Mystery Fiction
        • Fairy Tales, Magical & Traditional Stories
        •  

        • Fantasy Fiction
        • General Fiction
        • Horror & Ghost Stories
        • Humorous Stories
        • Romance & Love Stories
        • Science Fiction
      Explore All Children's >
    • AUDIO CDS
    • AUDIO CD BARGAINS
    • Sony Headphones
Audiobooks > Non-Fiction > Computing & I.T. > Computer Security > Data Encryption
Get Free Shipping on orders over $79

Data Encryption

REFINE YOUR RESULTS

SUBJECTS

  • Computer Fraud & Hacking
  • Computer Viruses
  • Data Encryption
  • Privacy & Data Protection
  • Spyware

LISTS

  • All Books (396)
  • Books (6970)

PRICE

CUSTOMER RATING

  •  
    (1) 
  •  
    & Up (2) 
  •  
    & Up (2) 

LANGUAGE

  • Audiobook
    (396)
  • Books
    (6970)
  • eBooks
    (8201)
  • Audio CDs
    (1)
8201 Results | View 24 / 100
< 1 ... 23 24 25 26 27 ... 83 >
Sort By
Sort By:
  • Hardware IP Security and Trust - Prabhat Mishra
    Hardware IP Security and Trust
    Prabhat Mishra
    eText
    Instant Online Reading*
    $209.00
    BUY EBOOK
  • Advanced Hybrid Information Processing : Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21-22, 2019, Proceedings, Part I - Guan Gui
    Advanced Hybrid Information Processing
    Third EAI International Conference, ADHIP 2019,...
    Guan Gui and Lin Yun
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Wireless Sensor Networks : Security, Coverage, and Localization - Rastko R. Selmic
    Wireless Sensor Networks
    Security, Coverage, and Localization
    Rastko R. Selmic, Vir V. Phoha and Abdul Serwadda
    eText
    Instant Online Reading*
    $119.00
    BUY EBOOK
  • Hardware Protection through Obfuscation - Domenic Forte
    Hardware Protection through Obfuscation
    Domenic Forte
    eText
    Instant Online Reading*
    $209.00
    BUY EBOOK
  • Feistel Ciphers : Security Proofs and Cryptanalysis - Valerie Nachef
    Feistel Ciphers
    Security Proofs and Cryptanalysis
    Valerie Nachef, Jacques Patarin and Emmanuel Volte
    eText
    Instant Online Reading*
    $209.00
    BUY EBOOK
  • Cyber Security : The Lifeline of Information and Communication Technology - Ramjee Prasad
    Cyber Security
    The Lifeline of Information and Communication T...
    Ramjee Prasad and Vandana Rohokale
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Sustainable Logistics and Production in Industry 4.0 : New Opportunities and Challenges - Katarzyna Grzybowska
    Sustainable Logistics and Production in Industry 4.0
    New Opportunities and Challenges
    Katarzyna Grzybowska, Anjali Awasthi and Rapinder Sawhney
    eText
    Instant Online Reading*
    $249.00
    BUY EBOOK
  • International Conference on Computer Networks and Communication Technologies : ICCNCT 2018 - S. Smys
    International Conference on Computer Networks and Communication Technologies
    ICCNCT 2018
    S. Smys, Robert Bestak, Joy Iong-Zong Chen and Ivan Kotuliak
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Fourth International Congress on Information and Communication Technology : ICICT 2019, London, Volume 1 - Xin-She Yang
    Fourth International Congress on Information and Communication Technology
    ICICT 2019, London, Volume 1
    Xin-She Yang
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Practical Hive : A Guide to Hadoop's Data Warehouse System - Scott Shaw
    Practical Hive
    A Guide to Hadoop's Data Warehouse System
    Scott Shaw, Andreas François Vermeulen, Ankur Gupta and David Kjerrumgaard
    eText
    Instant Online Reading*
    $59.99
    BUY EBOOK
  • Smart Microgrids : From Design to Laboratory-Scale Implementation - Shahab Bahrami
    Smart Microgrids
    From Design to Laboratory-Scale Implementation
    Shahab Bahrami and Ali Mohammadi
    eText
    Instant Online Reading*
    $139.00
    BUY EBOOK
  • How to Speak Tech : The Non-Techie's Guide to Key Technology Concepts - Vinay Trivedi
    How to Speak Tech
    The Non-Techie's Guide to Key Technology Concepts
    Vinay Trivedi
    eText
    Instant Online Reading*
    $54.99
    BUY EBOOK
  • The Hardware Trojan War : Attacks, Myths, and Defenses - Swarup Bhunia
    The Hardware Trojan War
    Attacks, Myths, and Defenses
    Swarup Bhunia and Mark M. Tehranipoor
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Proceedings of International Ethical Hacking Conference 2019 : eHaCON 2019, Kolkata, India - Mohuya Chakraborty
    Proceedings of International Ethical Hacking Conference 2019
    eHaCON 2019, Kolkata, India
    Mohuya Chakraborty, Satyajit Chakrabarti and Valentina E. Balas
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Cybercrime Prevention : Theory and Applications - Russell Brewer
    Cybercrime Prevention
    Theory and Applications
    Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt and David Maimon
    eText
    Instant Online Reading*
    $99.00
    BUY EBOOK
  • FinTech and Data Privacy in Germany : An Empirical Analysis with Policy Recommendations - Gregor Dorfleitner
    FinTech and Data Privacy in Germany
    An Empirical Analysis with Policy Recommendations
    Gregor Dorfleitner and Lars Hornuf
    eText
    Instant Online Reading*
    $189.00
    BUY EBOOK
  • Bug Bounty Hunting for Web Security : Find and Exploit Vulnerabilities in Web sites and Applications - Sanjib Sinha
    Bug Bounty Hunting for Web Security
    Find and Exploit Vulnerabilities in Web sites a...
    Sanjib Sinha
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Pro Spring Security : Securing Spring Framework 5 and Boot 2-based Java Applications - Carlo Scarioni
    Pro Spring Security
    Securing Spring Framework 5 and Boot 2-based Ja...
    Carlo Scarioni and Massimo Nardone
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Zero Trust Networks with VMware NSX : Build Highly Secure Network Architectures for Your Data Centers - Sreejith Keeriyattil
    Zero Trust Networks with VMware NSX
    Build Highly Secure Network Architectures for Y...
    Sreejith Keeriyattil
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Understanding Social Engineering Based Scams : Computer Science (R0) - Markus Jakobsson
    Understanding Social Engineering Based Scams
    Computer Science (R0)
    Markus Jakobsson
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Cybersecurity Lexicon - Luis Ayala
    Cybersecurity Lexicon
    Luis Ayala
    eText
    Instant Online Reading*
    $59.99
    BUY EBOOK
  • Security, Privacy and Trust in Cloud Systems - Surya Nepal
    Security, Privacy and Trust in Cloud Systems
    Surya Nepal and Mukaddim Pathan
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Cyberspace and International Relations : Theory, Prospects and Challenges - Author
    Cyberspace and International Relations
    Theory, Prospects and Challenges
    Author
    eText
    Instant Online Reading*
    $209.00
    BUY EBOOK
  • Dynamic Secrets in Communication Security - Sheng Xiao
    Dynamic Secrets in Communication Security
    Sheng Xiao, Weibo Gong and Don Towsley
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Security and Privacy in Biometrics - Patrizio Campisi
    Security and Privacy in Biometrics
    Patrizio Campisi
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Fault Tolerant Architectures for Cryptography and Hardware Security : Computer Architecture and Design Methodologies - Author
    Fault Tolerant Architectures for Cryptography and Hardware Security
    Computer Architecture and Design Methodologies
    Author
    eText
    Instant Online Reading*
    $219.00
    BUY EBOOK
  • Network Intrusion Detection using Deep Learning : A Feature Learning Approach - Kwangjo Kim
    Network Intrusion Detection using Deep Learning
    A Feature Learning Approach
    Kwangjo Kim, Muhamad Erza Aminanto and Harry Chandra Tanuwidjaja
    eText
    Instant Online Reading*
    $89.00
    BUY EBOOK
  • Domain Specific High-Level Synthesis for Cryptographic Workloads : Computer Architecture and Design Methodologies - Ayesha Khalid
    Domain Specific High-Level Synthesis for Cryptographic Workloads
    Computer Architecture and Design Methodologies
    Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Network Science and Cybersecurity : Advances in Information Security : Book 55 - Robinson E. Pino
    Network Science and Cybersecurity
    Advances in Information Security : Book 55
    Robinson E. Pino
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Anomaly Detection Principles and Algorithms : Computer Science (R0) - Kishan G. Mehrotra
    Anomaly Detection Principles and Algorithms
    Computer Science (R0)
    Kishan G. Mehrotra, Chilukuri K. Mohan and HuaMing Huang
    eText
    Instant Online Reading*
    $149.01
    BUY EBOOK
  • Secure Wireless Sensor Networks : Threats and Solutions - Mauro Conti
    Secure Wireless Sensor Networks
    Threats and Solutions
    Mauro Conti
    eText
    Instant Online Reading*
    $129.00
    BUY EBOOK
  • Histories of Computing in Eastern Europe : IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Pozna?, Poland, September 19-21, 2018, Revised Selected Papers - Christopher Leslie
    Histories of Computing in Eastern Europe
    IFIP WG 9.7 International Workshop on the Histo...
    Christopher Leslie and Martin Schmitt
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Security and Resiliency Analytics for Smart Grids : Static and Dynamic Approaches - Ehab Al-Shaer
    Security and Resiliency Analytics for Smart Grids
    Static and Dynamic Approaches
    Ehab Al-Shaer and Mohammad Ashiqur Rahman
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Passive and Active Measurement : 20th International Conference, PAM 2019, Puerto Varas, Chile, March 27-29, 2019, Proceedings - David Choffnes
    Passive and Active Measurement
    20th International Conference, PAM 2019, Puerto...
    David Choffnes and Marinho Barcellos
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings - Author
    Security, Privacy, and Applied Cryptography Engineering
    6th International Conference, SPACE 2016, Hyder...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Detection of Intrusions and Malware, and Vulnerability Assessment : 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings - Author
    Detection of Intrusions and Malware, and Vulnerability Assessment
    15th International Conference, DIMVA 2018, Sacl...
    Author
    eText
    Instant Online Reading*
    $99.00
    BUY EBOOK
  • Progress in Cryptology - AFRICACRYPT 2017 : 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings - Marc Joye and Abderrahmane Nitaj
    Progress in Cryptology - AFRICACRYPT 2017
    9th International Conference on Cryptology in A...
    Marc Joye and Abderrahmane Nitaj
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cryptography and Information Security in the Balkans : First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers - Author
    Cryptography and Information Security in the Balkans
    First International Conference, BalkanCryptSec ...
    Author
    eText
    Instant Online Reading*
    $79.99
    BUY EBOOK
  • Codes, Cryptology and Information Security : Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet - Said El Hajji
    Codes, Cryptology and Information Security
    Second International Conference, C2SI 2017, Rab...
    Said El Hajji, Abderrahmane Nitaj and El Mamoun Souidi
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Theory and Practice of Model Transformation : 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25-26, 2018, Proceedings - Arend Rensink
    Theory and Practice of Model Transformation
    11th International Conference, ICMT 2018, Held ...
    Arend Rensink and Jesús Sánchez Cuadrado
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Fast Software Encryption : 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers - Gregor Leander
    Fast Software Encryption
    22nd International Workshop, FSE 2015, Istanbul...
    Gregor Leander
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Applied Cryptography and Network Security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings - Mark Manulis
    Applied Cryptography and Network Security
    14th International Conference, ACNS 2016, Guild...
    Mark Manulis, Ahmad-Reza Sadeghi and Steve Schneider
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Mobile, Secure, and Programmable Networking : 5th International Conference, MSPN 2019, Mohammedia, Morocco, April 23-24, 2019, Revised Selected Papers - Éric Renault
    Mobile, Secure, and Programmable Networking
    5th International Conference, MSPN 2019, Mohamm...
    Éric Renault, Selma Boumerdassi, Cherkaoui Leghris and Samia Bouzefrane
    eText
    Instant Online Reading*
    $89.00
    BUY EBOOK
  • Mobile, Secure, and Programmable Networking : Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers - Author
    Mobile, Secure, and Programmable Networking
    Second International Conference, MSPN 2016, Par...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Image and Signal Processing : 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedings - Author
    Image and Signal Processing
    8th International Conference, ICISP 2018, Cherb...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Selected Areas in Cryptography - SAC 2015 : 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers - Author
    Selected Areas in Cryptography - SAC 2015
    22nd International Conference, Sackville, NB, C...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings - Jiageng Chen
    Network and System Security
    10th International Conference, NSS 2016, Taipei...
    Jiageng Chen, Vincenzo Piuri, Chunhua Su and Moti Yung
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Financial Cryptography and Data Security : FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers - Author
    Financial Cryptography and Data Security
    FC 2014 Workshops, BITCOIN and WAHC 2014, Chris...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Communication Technologies for Vehicles : 14th International Workshop, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, Colmar, France, May 16-17, 2019, Proceedings - Author
    Communication Technologies for Vehicles
    14th International Workshop, Nets4Cars/Nets4Tra...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Constructive Side-Channel Analysis and Secure Design : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers - Author
    Constructive Side-Channel Analysis and Secure Design
    5th International Workshop, COSADE 2014, Paris,...
    Author
    eText
    Instant Online Reading*
    $79.99
    BUY EBOOK
  • Progress in Cryptology - AFRICACRYPT 2016 : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings - David Pointcheval
    Progress in Cryptology - AFRICACRYPT 2016
    8th International Conference on Cryptology in A...
    David Pointcheval, Abderrahmane Nitaj and Tajjeeddine Rachidi
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Smart Card Research and Advanced Applications : 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers - Author
    Smart Card Research and Advanced Applications
    14th International Conference, CARDIS 2015, Boc...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings - Author
    Data Privacy Management, Cryptocurrencies and Blockchain Technology
    ESORICS 2017 International Workshops, DPM 2017 ...
    Author
    eText
    Instant Online Reading*
    $109.00
    BUY EBOOK
  • Theory of Cryptography : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II - Martin Hirt
    Theory of Cryptography
    14th International Conference, TCC 2016-B, Beij...
    Martin Hirt and Adam Smith
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology - EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I - Author
    Advances in Cryptology - EUROCRYPT 2016
    35th Annual International Conference on the The...
    Author
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Artificial Neural Networks and Machine Learning - ICANN 2019: Deep Learning : 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17-19, 2019, Proceedings, Part II - Igor V. Tetko
    Artificial Neural Networks and Machine Learning - ICANN 2019: Deep Learning
    28th International Conference on Artificial Neu...
    Igor V. Tetko, Ve?ra Ku?rková, Pavel Karpov and Fabian Theis
    eText
    Instant Online Reading*
    $149.01
    BUY EBOOK
  • Data and Applications Security and Privacy XXXIII : 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings - Simon N. Foley
    Data and Applications Security and Privacy XXXIII
    33rd Annual IFIP WG 11.3 Conference, DBSec 2019...
    Simon N. Foley
    eText
    Instant Online Reading*
    $119.00
    BUY EBOOK
  • Distributed Applications and Interoperable Systems : 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings - Silvia Bonomi
    Distributed Applications and Interoperable Systems
    18th IFIP WG 6.1 International Conference, DAIS...
    Silvia Bonomi and Etienne Rivière
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology - CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I - Matthew Robshaw
    Advances in Cryptology - CRYPTO 2016
    36th Annual International Cryptology Conference...
    Matthew Robshaw and Jonathan Katz
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Distributed Computing and Internet Technology : 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings - Sanjiva Prasad
    Distributed Computing and Internet Technology
    12th International Conference, ICDCIT 2016, Bhu...
    Sanjiva Prasad, Laxmi Parida and Nikolaj Bjorner
    eText
    Instant Online Reading*
    $79.99
    BUY EBOOK
  • Financial Cryptography and Data Security : FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers - Aviv Zohar
    Financial Cryptography and Data Security
    FC 2018 International Workshops, BITCOIN, VOTIN...
    Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark and Massimiliano Sala
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Data Privacy Management and Security Assurance : 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings - Author
    Data Privacy Management and Security Assurance
    11th International Workshop, DPM 2016 and 5th I...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Communication Systems and Networks : 9th International Conference, COMSNETS 2017, Bengaluru, India, January 4-8, 2017, Revised Selected Papers and Invited Papers - Author
    Communication Systems and Networks
    9th International Conference, COMSNETS 2017, Be...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Applied Cryptography and Network Security Workshops : ACNS 2019 Satellite Workshops, SiMLA, Cloud S &P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings - Jianying Zhou
    Applied Cryptography and Network Security Workshops
    ACNS 2019 Satellite Workshops, SiMLA, Cloud S &...
    Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar and Kehuan Zhang
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers - Anderson C.A. Nascimento
    Information Theoretic Security
    9th International Conference, ICITS 2016, Tacom...
    Anderson C.A. Nascimento and Paulo Barreto
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Constructive Side-Channel Analysis and Secure Design : 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings - Ilia Polian
    Constructive Side-Channel Analysis and Secure Design
    10th International Workshop, COSADE 2019, Darms...
    Ilia Polian and Marc Stöttinger
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology - EUROCRYPT 2016 : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II - Marc Fischlin
    Advances in Cryptology - EUROCRYPT 2016
    35th Annual International Conference on the The...
    Marc Fischlin and Jean-Sébastien Coron
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Information Security Theory and Practice : 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings - Gerhard P. Hancke
    Information Security Theory and Practice
    11th IFIP WG 11.2 International Conference, WIS...
    Gerhard P. Hancke and Ernesto Damiani
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Model-Based Safety and Assessment : 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16-18, 2019, Proceedings - Author
    Model-Based Safety and Assessment
    6th International Symposium, IMBSA 2019, Thessa...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Computer Safety, Reliability, and Security : 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings - Amund Skavhaug
    Computer Safety, Reliability, and Security
    35th International Conference, SAFECOMP 2016, T...
    Amund Skavhaug, Jérémie Guiochet and Friedemann Bitsch
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Image Analysis and Recognition : 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27-29, 2019, Proceedings, Part I - Fakhri Karray
    Image Analysis and Recognition
    16th International Conference, ICIAR 2019, Wate...
    Fakhri Karray, Aurélio Campilho and Alfred Yu
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security Applications : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers - Ho-won Kim
    Information Security Applications
    16th International Workshop, WISA 2015, Jeju Is...
    Ho-won Kim and Dooho Choi
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Constructive Side-Channel Analysis and Secure Design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers - Stefan Mangard
    Constructive Side-Channel Analysis and Secure Design
    6th International Workshop, COSADE 2015, Berlin...
    Stefan Mangard and Axel Y. Poschmann
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Mathematical Software - ICMS 2018 : 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings - Author
    Mathematical Software - ICMS 2018
    6th International Conference, South Bend, IN, U...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings - Author
    Provable Security
    10th International Conference, ProvSec 2016, Na...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Critical Information Infrastructures Security : 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers - Christos G. Panayiotou
    Critical Information Infrastructures Security
    9th International Conference, CRITIS 2014, Lima...
    Christos G. Panayiotou, Georgios Ellinas, Elias Kyriakides and Marios M. Polycarpou
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • ECML PKDD 2018 Workshops : Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings - Author
    ECML PKDD 2018 Workshops
    Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Computer Safety, Reliability, and Security : SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Turku, Finland, September 10, 2019, Proceedings - Alexander Romanovsky
    Computer Safety, Reliability, and Security
    SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR...
    Alexander Romanovsky, Elena Troubitsyna, Ilir Gashi, Erwin Schoitsch and Friedemann Bitsch
    eText
    Instant Online Reading*
    $99.00
    BUY EBOOK
  • Cyber Security Cryptography and Machine Learning : Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings - Author
    Cyber Security Cryptography and Machine Learning
    Third International Symposium, CSCML 2019, Beer...
    Author
    eText
    Instant Online Reading*
    $99.00
    BUY EBOOK
  • Principles of Security and Trust : 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings - Author
    Principles of Security and Trust
    5th International Conference, POST 2016, Held a...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cyber Security Cryptography and Machine Learning : Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings - Itai Dinur
    Cyber Security Cryptography and Machine Learning
    Second International Symposium, CSCML 2018, Bee...
    Itai Dinur, Shlomi Dolev and Sachin Lodha
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Engineering Secure Software and Systems : 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings - Juan Caballero
    Engineering Secure Software and Systems
    8th International Symposium, ESSoS 2016, London...
    Juan Caballero, Eric Bodden and Elias Athanasopoulos
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Privacy Technologies and Policy : Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers - Bettina Berendt
    Privacy Technologies and Policy
    Third Annual Privacy Forum, APF 2015, Luxembour...
    Bettina Berendt, Thomas Engel, Demosthenes Ikonomou, Daniel Le Métayer and Stefan Schiffner
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Applied Cryptography and Network Security : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings - Bart Preneel
    Applied Cryptography and Network Security
    16th International Conference, ACNS 2018, Leuve...
    Bart Preneel and Frederik Vercauteren
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Digital-Forensics and Watermarking : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers - Yun-Qing Shi
    Digital-Forensics and Watermarking
    14th International Workshop, IWDW 2015, Tokyo, ...
    Yun-Qing Shi, Hyoung Joong Kim, Fernando Pérez-González and Isao Echizen
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Theory of Cryptography : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I - Martin Hirt
    Theory of Cryptography
    14th International Conference, TCC 2016-B, Beij...
    Martin Hirt and Adam Smith
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security and Cryptology - ICISC 2015 : 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers - Aaram Yun
    Information Security and Cryptology - ICISC 2015
    18th International Conference, Seoul, South Kor...
    Aaram Yun and Soonhak Kwon
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Computational Science - ICCS 2018 : 18th International Conference, Wuxi, China, June 11-13, 2018 Proceedings, Part III - Yong Shi
    Computational Science - ICCS 2018
    18th International Conference, Wuxi, China, Jun...
    Yong Shi, Haohuan Fu, Yingjie Tian, Valeria V. Krzhizhanovskaya and Peter M. A. Sloot
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • ECML PKDD 2018 Workshops : MIDAS 2018 and PAP 2018, Dublin, Ireland, September 10-14, 2018, Proceedings - Carlos Alzate
    ECML PKDD 2018 Workshops
    MIDAS 2018 and PAP 2018, Dublin, Ireland, Septe...
    Carlos Alzate, Anna Monreale, Livio Bioglio, Valerio Bitetta and Tiziano Squartini
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Smart Grid Security : Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers - Jorge Cuellar
    Smart Grid Security
    Second International Workshop, SmartGridSec 201...
    Jorge Cuellar
    eText
    Instant Online Reading*
    $64.99
    BUY EBOOK
  • Computational Science - ICCS 2018 : 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II - Author
    Computational Science - ICCS 2018
    18th International Conference, Wuxi, China, Jun...
    Author
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Information Security Applications : 19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers - Author
    Information Security Applications
    19th International Conference, WISA 2018, Jeju ...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Innovative Security Solutions for Information Technology and Communications : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers - Ion Bica
    Innovative Security Solutions for Information Technology and Communications
    9th International Conference, SECITC 2016, Buch...
    Ion Bica and Reza Reyhanitabar
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security and Cryptology : 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers - Fuchun Guo
    Information Security and Cryptology
    14th International Conference, Inscrypt 2018, F...
    Fuchun Guo, Xinyi Huang and Moti Yung
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cryptography and Coding : 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings - Jens Groth
    Cryptography and Coding
    15th IMA International Conference, IMACC 2015, ...
    Jens Groth
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology - CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II - Author
    Advances in Cryptology - CRYPTO 2016
    36th Annual International Cryptology Conference...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information and Communications Security : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers - Sihan Qing
    Information and Communications Security
    17th International Conference, ICICS 2015, Beij...
    Sihan Qing, Eiji Okamoto, Kwangjo Kim and Dongmei Liu
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Smart Grid Inspired Future Technologies : First International Conference, SmartGIFT 2016, Liverpool, UK, May 19-20, 2016, Revised Selected Papers - Jia Hu
    Smart Grid Inspired Future Technologies
    First International Conference, SmartGIFT 2016,...
    Jia Hu, Kun Yang, Yan Zhang, Jianliang Gao and Victor C. M. Leung
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Perspectives in Business Informatics Research : 18th International Conference, BIR 2019, Katowice, Poland, September 23-25, 2019, Proceedings - Ma?gorzata Pa?kowska
    Perspectives in Business Informatics Research
    18th International Conference, BIR 2019, Katowi...
    Ma?gorzata Pa?kowska and Kurt Sandkuhl
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Location Privacy Protection in Mobile Networks : SpringerBriefs in Computer Science - Xinxin Liu
    Location Privacy Protection in Mobile Networks
    SpringerBriefs in Computer Science
    Xinxin Liu and Xiaolin Li
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
8201 Results | View 24 / 100
< 1 ... 23 24 25 26 27 ... 83 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW