Hello! Enter your postcode for delivery time
Track My Order
Help Centre
+61 2 88805247
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
    • FICTION

        Browse Fiction

      • New Releases
      • Bestselling
        • Popular Authors

        • Bryce Courtenay
        • Danielle Steel
        • Di Morrissey
        • Ian Fleming
        •  

        • J.K Rowling
        • J. R. R. Tolkien
        • James Patterson
        • Popular Subjects

        • Action & Adventure
        • Classic Fiction
        • Crime & Mystery
        • Fantasy Fiction
        • Historical Fiction
        •  

        • Horror & Ghost Stories
        • Modern & Contemporary Fiction
        • Romance
        • Thrillers & Suspense
      Explore All Fiction >
    • NON-FICTION
        • Subjects

        • Accounting & Finance
        • Animals & Nature
        • Antiques & Collectables
        • Archaeology
        • Arts & Entertainment
        • Biographies & True Stories
        • Business & Management
        •  

        • Children's Non-Fiction
        • Comedy & Humour
        • Computing & I.T.
        • Cooking, Food & Drink
        • Crafts & Handiwork
        • Dictionaries
        • Earth Sciences & Environment
        • Economics
        • Education
        •  

        • Engineering & Technology
        • Family & Health
        • Gardening
        • History
        • Hobbies, Games & Puzzles
        • Home & House Maintenance
        • Industry & Industrial Studies
        • Language & Linguistics
        •  

        • Law
        • Library & Info Sciences
        • Lifestyle & Fashion
        • Literature, Poetry & Plays
        • Mathematics
        • Medicine
        • Mind, Body, Spirit
        • Philosophy
        •  

        • Politics & Government
        • Psychology
        • Reference & Encyclopaedias
        • Religion & Beliefs
        • Science
        • Self-Help & Personal Development
        • Social Services & Welfare
        •  

        • Society & Culture
        • Sociology & Anthropology
        • Sports & Recreation
        • Teaching English (ELT)
        • Transportation
        • Travel & Holidays
        • Travel Maps & Atlases
        • Warfare & Defence
    • CHILDREN

        Browse Children's

      • New Releases
      • Bestselling
        • Popular Authors

        • Andy Griffiths
        • Enid Blyton
        • J.K Rowling
        • John Flanagan
        • Lemony Snicket
        • Stephaine Meyer
        • Popular Subjects

        • Action & Adventure
        • Children's Non-Fiction
        • Children's Classics
        • Crime & Mystery Fiction
        • Fairy Tales, Magical & Traditional Stories
        •  

        • Fantasy Fiction
        • General Fiction
        • Horror & Ghost Stories
        • Humorous Stories
        • Romance & Love Stories
        • Science Fiction
      Explore All Children's >
    • AUDIO CDS
    • AUDIO CD BARGAINS
    • Sony Headphones
Audiobooks > Non-Fiction > Computing & I.T. > Computer Security > Data Encryption
Get Free Shipping on orders over $79

Data Encryption

REFINE YOUR RESULTS

SUBJECTS

  • Computer Fraud & Hacking
  • Computer Viruses
  • Data Encryption
  • Privacy & Data Protection
  • Spyware

LISTS

  • All Books (394)
  • Books (6927)

PRICE

CUSTOMER RATING

  •  
    (15) 
  •  
    & Up (23) 
  •  
    & Up (24) 

LANGUAGE

  • Audiobook
    (394)
  • Books
    (6927)
  • eBooks
    (8535)
  • Audio CDs
    (2)
6927 Results | View 24 / 100
< 1 ... 66 67 68 69 70 >
Sort By
Sort By:
  • Cryptonomicon : Exploring the Rise of Modern Cryptography, World War II Codebreaking, and the Advent of Blockchain Technology - Ethan J Monroe
    Cryptonomicon
    Exploring the Rise of Modern Cryptography, Worl...
    Ethan J Monroe
    Paperback
    RRP $25.29
    $24.75
    BUY NOW
  • Crypto FSM Recursion - Punam Raj
    Crypto FSM Recursion
    Punam Raj
    Paperback
    $53.99
    BUY NOW
  • Computer Security and Cryptography - Nessa O'Brein
    Computer Security and Cryptography
    Nessa O'Brein
    Hardcover
    $344.75
    BUY NOW
  • Encryption Demystified The Key to Securing Your Digital Life - A. Scholtens
    Encryption Demystified The Key to Securing Your Digital Life
    A. Scholtens
    Paperback
    $64.75
    BUY NOW
  • Basics of OAuth Securely Connecting Your Applications - A. Scholtens
    Basics of OAuth Securely Connecting Your Applications
    A. Scholtens
    Paperback
    $46.75
    BUY NOW
  • Darkmarket : How Hackers Became the New Mafia - Misha Glenny
    Darkmarket
    How Hackers Became the New Mafia
    Misha Glenny
    Paperback
    $44.75
    BUY NOW
  • Recent Advances in Face Recognition - Kresimir Delac
    Recent Advances in Face Recognition
    Kresimir Delac, Mislav Grgic and Sonja Grgic
    Hardcover
    $342.75
    BUY NOW
  • The Voynich Manuscript : The Cipher and The Compendium - Jessica Lorraine Scott (Dunn)
    The Voynich Manuscript
    The Cipher and The Compendium
    Jessica Lorraine Scott (Dunn)
    Hardcover
    RRP $137.49
    $116.75
    15%
    OFF
    BUY NOW
  • Cybersecurity For Beginners : Unlock the mystery - Ayhma Awther
    Cybersecurity For Beginners
    Unlock the mystery
    Ayhma Awther
    Hardcover
    RRP $37.39
    $35.75
    BUY NOW
  • WLFI - We've Lost Financial Independence - Langdon Cage
    WLFI - We've Lost Financial Independence
    Langdon Cage
    Paperback
    RRP $21.99
    $21.75
    BUY NOW
  • AI vs. Humanity - The Battle for Human Relevance : How We Can Survive and Thrive in the Age of AI - Christopher Uchenwa
    AI vs. Humanity - The Battle for Human Relevance
    How We Can Survive and Thrive in the Age of AI
    Christopher Uchenwa
    Paperback
    $55.99
    BUY NOW
  • AI vs. Humanity - The Battle for Human Relevance : How We Can Survive and Thrive in the Age of AI - Christopher Uchenwa
    AI vs. Humanity - The Battle for Human Relevance
    How We Can Survive and Thrive in the Age of AI
    Christopher Uchenwa
    Hardcover
    $71.99
    BUY NOW
  • An Essay On The Art Of Decyphering - John Davys
    An Essay On The Art Of Decyphering
    John Davys and John Wallis
    Paperback
    $30.75
    BUY NOW
  • Computer Security for ASSIST - Martin H. Beach
    Computer Security for ASSIST
    Martin H. Beach
    Hardcover
    $43.95
    BUY NOW
  • Information Security - United States Government Accountabili...
    Information Security
    United States Government Accountabili...
    Paperback
    $29.65
    BUY NOW
  • Cyber Security Education - United States Congress House of Repre...
    Cyber Security Education
    United States Congress House of Repre...
    Hardcover
    $43.95
    BUY NOW
  • Public Key Infrastructure - United States Government Accountabili...
    Public Key Infrastructure
    United States Government Accountabili...
    Hardcover
    $42.85
    BUY NOW
  • Public Key Infrastructure - United States Government Accountabili...
    Public Key Infrastructure
    United States Government Accountabili...
    Paperback
    $29.65
    BUY NOW
  • Six Sigma for Continuous Improvement in Cybersecurity : A Guide for Students and Professionals - Emre Tokgoz
    Six Sigma for Continuous Improvement in Cybersecurity
    A Guide for Students and Professionals
    Emre Tokgoz
    Hardcover
    $64.99
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Hardcover
    $43.95
    BUY NOW
  • Cybermad - David A. Gale
    Cybermad
    David A. Gale
    Paperback
    $29.65
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Paperback
    $30.75
    BUY NOW
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Hardcover
    $43.95
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Hardcover
    $49.45
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Hardcover
    $45.05
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Hardcover
    $42.85
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Hardcover
    $43.95
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Hardcover
    $45.05
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Hardcover
    $48.35
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Hardcover
    $42.85
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Hardcover
    $49.45
    BUY NOW
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Paperback
    $30.75
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Paperback
    $36.25
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Paperback
    $30.75
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Paperback
    $29.65
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Paperback
    $34.05
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Paperback
    $29.65
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Hardcover
    $43.95
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Hardcover
    $45.05
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Paperback
    $35.15
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Paperback
    $34.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Hardcover
    $43.95
    BUY NOW
  • Simple Public Key Infrastructure Analysis Protocol Analysis and Design - Alexander G. Vidergar
    Simple Public Key Infrastructure Analysis Protocol Analysis and Design
    Alexander G. Vidergar
    Hardcover
    $43.95
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Paperback
    $36.25
    BUY NOW
  • Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function - Jeffrey L. Falkinburg
    Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
    Jeffrey L. Falkinburg
    Hardcover
    $45.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Paperback
    $30.75
    BUY NOW
  • Course Curriculum Development for the Future Cyberwarrior - Mark A. Chacon
    Course Curriculum Development for the Future Cyberwarrior
    Mark A. Chacon
    Hardcover
    $42.85
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Paperback
    $30.75
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Paperback
    $34.05
    BUY NOW
  • Android Protection System - Jonathan D. Stueckle
    Android Protection System
    Jonathan D. Stueckle
    Hardcover
    $43.95
    BUY NOW
  • Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection - Matthew A. Zimmerman
    Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
    Matthew A. Zimmerman
    Hardcover
    $43.95
    BUY NOW
  • An Analysis of Biometric Technology as an Enabler to Information Assurance - Darren A. Deschaine
    An Analysis of Biometric Technology as an Enabler to Information Assurance
    Darren A. Deschaine
    Paperback
    $30.75
    BUY NOW
  • Active Computer Network Defense - Eric J. Holdaway
    Active Computer Network Defense
    Eric J. Holdaway
    Hardcover
    $42.85
    BUY NOW
  • Enemy at the Gateways - Nathan B. Paddock
    Enemy at the Gateways
    Nathan B. Paddock
    Hardcover
    $42.85
    BUY NOW
  • Psychological Operations Within the Cyberspace Domain - Prentiss O. Baker
    Psychological Operations Within the Cyberspace Domain
    Prentiss O. Baker
    Hardcover
    $42.85
    BUY NOW
  • Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation - Michael J. Myers
    Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
    Michael J. Myers
    Paperback
    $30.75
    BUY NOW
  • Development of an Malicious Insider Composite Vulnerability Assessment Methodology - William H. King
    Development of an Malicious Insider Composite Vulnerability Assessment Methodology
    William H. King
    Paperback
    $34.05
    BUY NOW
  • To Click or Not to Click - Richard Janoso
    To Click or Not to Click
    Richard Janoso
    Hardcover
    $42.85
    BUY NOW
  • U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States - Brian G. Hermann
    U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
    Brian G. Hermann
    Paperback
    $29.65
    BUY NOW
  • An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS - Danny R. Bias
    An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS
    Danny R. Bias
    Paperback
    $30.75
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Hardcover
    $45.05
    BUY NOW
  • Cybersecurity Essentials for Small Businesses : Protect Your Business from Breaches, Ransomware, and Compliance Failures - Eric LeBouthillier
    Cybersecurity Essentials for Small Businesses
    Protect Your Business from Breaches, Ransomware...
    Eric LeBouthillier
    Paperback
    RRP $32.99
    $32.75
    BUY NOW
  • Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function - Jeffrey L. Falkinburg
    Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
    Jeffrey L. Falkinburg
    Paperback
    $34.05
    BUY NOW
  • Mission Assurance - Brian L. Hale
    Mission Assurance
    Brian L. Hale
    Hardcover
    $48.35
    BUY NOW
  • Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework - Larissa A. O'Brien
    Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
    Larissa A. O'Brien
    Hardcover
    $43.95
    BUY NOW
  • Software Protection Against Reverse Engineering Tools - Joshua A. Benson
    Software Protection Against Reverse Engineering Tools
    Joshua A. Benson
    Hardcover
    $48.35
    BUY NOW
  • Course Curriculum Development for the Future Cyberwarrior - Mark A. Chacon
    Course Curriculum Development for the Future Cyberwarrior
    Mark A. Chacon
    Paperback
    $29.65
    BUY NOW
  • Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment - Nicholas A. Fraser
    Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
    Nicholas A. Fraser
    Paperback
    $34.05
    BUY NOW
  • Patching the Wetware - Alexander D. Nelson
    Patching the Wetware
    Alexander D. Nelson
    Hardcover
    $43.95
    BUY NOW
  • Software Protection Against Reverse Engineering Tools - Joshua A. Benson
    Software Protection Against Reverse Engineering Tools
    Joshua A. Benson
    Paperback
    $35.15
    BUY NOW
  • Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework - Larissa A. O'Brien
    Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
    Larissa A. O'Brien
    Paperback
    $30.75
    BUY NOW
  • USCYBERCOM - Robert T. Bridges
    USCYBERCOM
    Robert T. Bridges
    Hardcover
    $42.85
    BUY NOW
  • Offensive Cyber Capability - Stephen M. Marshall
    Offensive Cyber Capability
    Stephen M. Marshall
    Hardcover
    $43.95
    BUY NOW
  • Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework - Jeffrey B. Scott
    Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework
    Jeffrey B. Scott
    Paperback
    $34.05
    BUY NOW
  • Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis - Lauren M. Wagoner
    Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
    Lauren M. Wagoner
    Paperback
    $34.05
    BUY NOW
  • Establishing the Human Firewall - Jamison W. Scheeres
    Establishing the Human Firewall
    Jamison W. Scheeres
    Hardcover
    $42.85
    BUY NOW
  • Spear Phishing Attack Detection - David T. Merritt
    Spear Phishing Attack Detection
    David T. Merritt
    Hardcover
    $45.05
    BUY NOW
  • Multi-Class Classification for Identifying JPEG Steganography Embedding Methods - Benjamin M. Rodriguez
    Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
    Benjamin M. Rodriguez
    Hardcover
    $48.35
    BUY NOW
  • Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems - Brendan K. Casey
    Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
    Brendan K. Casey
    Hardcover
    $42.85
    BUY NOW
  • Toward Cyber Omniscience - William P. Jensen
    Toward Cyber Omniscience
    William P. Jensen
    Hardcover
    $42.85
    BUY NOW
  • Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems - Brendan K. Casey
    Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
    Brendan K. Casey
    Paperback
    $29.65
    BUY NOW
  • An Analysis of Botnet Vulnerabilities - Sean W. Hudson
    An Analysis of Botnet Vulnerabilities
    Sean W. Hudson
    Paperback
    $30.75
    BUY NOW
  • Suspicion Modeling in Support of Cyber-Influence Operations/Tactics - Henry G. Paguirigan
    Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
    Henry G. Paguirigan
    Paperback
    $34.05
    BUY NOW
  • Toward Cyber Omniscience - William P. Jensen
    Toward Cyber Omniscience
    William P. Jensen
    Paperback
    $29.65
    BUY NOW
  • Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems - Matthew J. Mcalister
    Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems
    Matthew J. Mcalister
    Hardcover
    $45.05
    BUY NOW
  • An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment - Denzil L. Hellesen
    An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment
    Denzil L. Hellesen
    Hardcover
    $45.05
    BUY NOW
  • Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks - Kevin M. Finnigin
    Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks
    Kevin M. Finnigin
    Hardcover
    $45.05
    BUY NOW
  • Virtualization Technology Applied to Rootkit Defense - Douglas P. Medley
    Virtualization Technology Applied to Rootkit Defense
    Douglas P. Medley
    Paperback
    $30.75
    BUY NOW
  • U.S. Cyber Strategy Deterrence and Strategic Response - Brian G. Hermann
    U.S. Cyber Strategy Deterrence and Strategic Response
    Brian G. Hermann
    Hardcover
    $42.85
    BUY NOW
  • Interagency Organization for Cyberwar - Donovan L. Routsis
    Interagency Organization for Cyberwar
    Donovan L. Routsis
    Paperback
    $29.65
    BUY NOW
  • Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling - Ryan T. Ostler
    Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
    Ryan T. Ostler
    Hardcover
    $48.35
    BUY NOW
  • To Click or Not to Click - Richard Janoso
    To Click or Not to Click
    Richard Janoso
    Paperback
    $29.65
    BUY NOW
  • Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling - Ryan T. Ostler
    Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
    Ryan T. Ostler
    Paperback
    $35.15
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Paperback
    $34.05
    BUY NOW
  • Defining Our National Cyberspace Boundaries - United States Army: U.S. Army War Col...
    Defining Our National Cyberspace Boundaries
    Jeffery R. Schilling and United States Army: U.S. Army War Col...
    Paperback
    $29.65
    BUY NOW
  • What Senior Leaders Need to Know About Cyberspace - United States Army: U.S. Army War Col...
    What Senior Leaders Need to Know About Cyberspace
    Jeffrey L. Caton and United States Army: U.S. Army War Col...
    Paperback
    $29.65
    BUY NOW
6927 Results | View 24 / 100
< 1 ... 66 67 68 69 70 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2025 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW