Hello! Enter your postcode for delivery time
Track My Order
Help Centre
+61 2 88805247
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
    • FICTION

        Browse Fiction

      • New Releases
      • Bestselling
      • Bargains
      • Signed Copies
        • Popular Subjects

        • Australian Fiction
        • Classic Fiction
        • Crime & Mystery
        • Erotic Fiction
        • Fantasy
        • Graphic Novels & Manga
        • Historical
        • Modern & Contemporary
        •  

        • Poetry
        • Romance
        • Science Fiction
        • Thrillers & Mystery
        • Young Adult
        • Popular Authors

        • Margaret Atwood
        • Trent Dalton
        • Jane Harper
        • Stephen King
        • Dervla McTiernan
        • Liane Moriarty
        • Matthew Reilly
        • Sally Rooney
        • Popular Series

        • After
        • A Game of Thrones
        • Jack Reacher
        • Jack West
        • The Seven Sisters
        • Outlander
        • The Witcher
        • Wolf Hall

        More:

      • Award Winning Reads
      • Reviews and Staff Picks
      • Author Interviews
      • Podcasts
      • Explore All Fiction >
    • NON-FICTION

        Browse Non-Fiction

      • Bestselling
      • Bargains
      • Signed Copies
        • Popular Subjects

        • Animals & Nature
        • Arts & Entertainment
        • Biographies & True Stories
        • Business & Management
        • Comedy & Humour
        • Computing & IT
        • Cooking, Food & Drink
        • Crafts & Handiwork
        • Family & Health
        • Fashion & Style Guides
        • Fitness & Diet
        • Gardening
        • Green Lifestyle & Self-Sufficiency
        • History
        • House & Home
        •  

        • Language & Linguistics
        • Mind, Body, Spirit
        • Politics & Government
        • Popular Psychology
        • Religion & Beliefs
        • Science
        • Self Help & Personal Development
        • Society & Culture
        • Sport & Recreation
        • Transportation
        • Travel & Holidays
        • Biographies & True Stories

        • Arts & Entertainment Biographies
        • Historical Biographies
        • Sport Biographies
        • Travel Writing
        • True Crime
        • True Stories of Heroism
        • Cooking, Food & Drink

        • Baking & Desserts
        • Cooking for & with Children
        • Health & Wholefood Cookery
        • National & Regional Cuisine
        • TV & Celebrity Chefs
        • Vegetarian Cookery
        • Self Help & Personal Development

        • Advice on Careers & Success
        • Advice on Parenting
        • Family, Health & Relationships
        • Fitness & Diet
        • Mind, Body, Spirit
        • Popular Psychology
        • Professional

        • Business
        • Law
        • Medicine

        More:

      • Award Winning Reads
      • Reviews and Staff Picks
      • Author Interviews
      • Podcasts
      • Explore All Non-Fiction >
    • KIDS & YA

        Browse Kids & YA

      • New Releases
      • Bestselling
      • Bargains
      • Signed Copies
        • Browse by Age

        • Under 3
        • Pre-School (3-6)
        • School Age (6-9)
        • Pre-Teen (9-12)
        • Teen (12-15)
        • Young Adult (16+)
        • Popular Authors

        • Aaron Blabey
        • Anh Do
        • J.K. Rowling
        • Emily Rodda
        • Rick Riordan
        • Mem Fox
        • David Walliams
        • Cassandra Clare
        • Popular Series

        • Harry Potter
        • Bluey
        • The Treehouse Series
        • Nevermoor
        • Dog Man
        • Billie B Brown
        • Fun for Kids
        • Education

        • Education Central
        • Pre School
        • Primary School
        • Secondary School

        More:

      • CBCA Awards
      • Reviews and Staff Picks
      • Author Interviews
      • Podcasts
      • Explore All Kids & YA Books >
    • AUSTRALIAN
    • EDUCATION
        • Pre-School / Kindergarten

        • Pre-School & Day-Care
        • Starting School
        • Early Learning
        • ABC Reading Eggs
        • Picks for Toddlers
        • Picks for Pre-school
        • Sleeping Easy
        • Managing Manners
        • Big Picture Books
        • Understanding Emotions
        • Primary

        • Bestselling Primary Texts
        • Excel Guides for Primary
        • All About Sport
        • Reading
        • Maths
        • Primary Reference
        • CBCA Books
        • Secondary

        • Bestselling Secondary Texts
        • Accounting Business & Legal
        • Media, Arts & Religion
        • Reference & Study Guides
        • Guides to the School Certificates
        • Biology & Science
        • English & Literature
        • History
        • Languages
        • Maths
        •  

        • Poetry
        • Plays
        • Classic Fiction
        • Guides and Resources

        • NAPLAN
        • Anti-Bullying Books
        • Empowering Girls
        • Introducing Indigenous Culture
        • Oxford Dictionaries
      Education Central
      Explore All Education >
    • DIGITAL TEXTBOOKS
    • ACADEMIC
        • University

        • Accounting, Business & Finance
        • Biology and Sciences
        • Computing & Programming
        • Education
        • Engineering & Physics
        • English & Literature
        • Environment & Planning
        • Health Care
        •  

        • History
        • Language
        • Law
        • Mathematics & Statistics
        • Media, Communication & Arts
        • Medicine
        • Nursing
        • Politics
        •  

        • Psychology
        • Social Sciences
        • Study Skills
        • Vocational

        • Trades
        • Hospitality & Tourism
        • Business, Financial & Management
        • Nursing & Health Care
        • IT, Networking & Computer Repair
        • Education & Early Childhood
        • Social Working & Counselling
        • Design, Art, Fashion & Photography
      Explore All Academic >
    • BARGAINS
    • GIFT CERTIFICATES
Books > Non-Fiction > Computing & I.T. > Computer Security > Data Encryption
Get Free Shipping on orders over $79

Data Encryption

REFINE YOUR RESULTS

SUBJECTS

  • Computer Fraud & Hacking
  • Computer Viruses
  • Data Encryption
  • Firewalls
  • Privacy & Data Protection
  • Spam
  • Spyware

LISTS

  • All Books (6941)
  • Australian Authors Books (1)
  • Hot Prices (51)
  • Audiobooks (394)

AVAILABILITY

  • All Books (6941)
  • New Releases (256)
  • Coming Soon (100)
  • Ready To Ship (85)

PRICE

CUSTOMER RATING

  •  
    (15) 
  •  
    & Up (23) 
  •  
    & Up (24) 

FORMATS

LANGUAGE

  • Book
    (6941)
  • eBooks
    (8533)
  • Audiobooks
    (394)
  • Audio CDs
    (2)
6941 Results | View 24 / 100
< 1 ... 67 68 69 70 >
Sort By
Sort By:
  • Information Security - United States Government Accountabili...
    Information Security
    United States Government Accountabili...
    Hardcover
    $42.85
    BUY NOW
  • Palo Alto Security - Oliver Trent
    Palo Alto Security
    Oliver Trent
    Paperback
    $38.49
    BUY NOW
  • Unlocking the Secrets of Web 3.0 Wealth : Your User Guide to Decentralized Finance for 2025 Thru 2028 - David James Green
    Unlocking the Secrets of Web 3.0 Wealth
    Your User Guide to Decentralized Finance for 20...
    David James Green
    Paperback
    $50.59
    BUY NOW
  • How to Buy Crypto A Handbook from Cold Wallets to Blockchain Basics - Crypto College
    How to Buy Crypto A Handbook from Cold Wallets to Blockchain Basics
    Crypto College
    Paperback
    $16.72
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Hardcover
    $43.95
    BUY NOW
  • Cybermad - David A. Gale
    Cybermad
    David A. Gale
    Paperback
    $29.65
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Paperback
    $30.75
    BUY NOW
  • Bestseller Bargains
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Hardcover
    $43.95
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Hardcover
    $49.45
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Hardcover
    $45.05
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Hardcover
    $42.85
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Hardcover
    $43.95
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Hardcover
    $45.05
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Hardcover
    $48.35
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Hardcover
    $42.85
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Hardcover
    $49.45
    BUY NOW
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Paperback
    $30.75
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Paperback
    $36.25
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Paperback
    $30.75
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Paperback
    $29.65
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Paperback
    $34.05
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Paperback
    $29.65
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Hardcover
    $43.95
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Hardcover
    $45.05
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Paperback
    $35.15
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Paperback
    $34.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Hardcover
    $43.95
    BUY NOW
  • Simple Public Key Infrastructure Analysis Protocol Analysis and Design - Alexander G. Vidergar
    Simple Public Key Infrastructure Analysis Protocol Analysis and Design
    Alexander G. Vidergar
    Hardcover
    $43.95
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Paperback
    $36.25
    BUY NOW
  • Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function - Jeffrey L. Falkinburg
    Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
    Jeffrey L. Falkinburg
    Hardcover
    $45.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Paperback
    $30.75
    BUY NOW
  • Course Curriculum Development for the Future Cyberwarrior - Mark A. Chacon
    Course Curriculum Development for the Future Cyberwarrior
    Mark A. Chacon
    Hardcover
    $42.85
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Paperback
    $30.75
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Paperback
    $34.05
    BUY NOW
  • Android Protection System - Jonathan D. Stueckle
    Android Protection System
    Jonathan D. Stueckle
    Hardcover
    $43.95
    BUY NOW
  • Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection - Matthew A. Zimmerman
    Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
    Matthew A. Zimmerman
    Hardcover
    $43.95
    BUY NOW
  • An Analysis of Biometric Technology as an Enabler to Information Assurance - Darren A. Deschaine
    An Analysis of Biometric Technology as an Enabler to Information Assurance
    Darren A. Deschaine
    Paperback
    $30.75
    BUY NOW
  • Active Computer Network Defense - Eric J. Holdaway
    Active Computer Network Defense
    Eric J. Holdaway
    Hardcover
    $42.85
    BUY NOW
  • Enemy at the Gateways - Nathan B. Paddock
    Enemy at the Gateways
    Nathan B. Paddock
    Hardcover
    $42.85
    BUY NOW
  • Psychological Operations Within the Cyberspace Domain - Prentiss O. Baker
    Psychological Operations Within the Cyberspace Domain
    Prentiss O. Baker
    Hardcover
    $42.85
    BUY NOW
  • Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation - Michael J. Myers
    Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
    Michael J. Myers
    Paperback
    $30.75
    BUY NOW
  • Development of an Malicious Insider Composite Vulnerability Assessment Methodology - William H. King
    Development of an Malicious Insider Composite Vulnerability Assessment Methodology
    William H. King
    Paperback
    $34.05
    BUY NOW
  • To Click or Not to Click - Richard Janoso
    To Click or Not to Click
    Richard Janoso
    Hardcover
    $42.85
    BUY NOW
  • U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States - Brian G. Hermann
    U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
    Brian G. Hermann
    Paperback
    $29.65
    BUY NOW
  • An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS - Danny R. Bias
    An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS
    Danny R. Bias
    Paperback
    $30.75
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Hardcover
    $45.05
    BUY NOW
  • Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function - Jeffrey L. Falkinburg
    Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
    Jeffrey L. Falkinburg
    Paperback
    $34.05
    BUY NOW
  • Mission Assurance - Brian L. Hale
    Mission Assurance
    Brian L. Hale
    Hardcover
    $48.35
    BUY NOW
  • Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework - Larissa A. O'Brien
    Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
    Larissa A. O'Brien
    Hardcover
    $43.95
    BUY NOW
  • Software Protection Against Reverse Engineering Tools - Joshua A. Benson
    Software Protection Against Reverse Engineering Tools
    Joshua A. Benson
    Hardcover
    $48.35
    BUY NOW
  • Course Curriculum Development for the Future Cyberwarrior - Mark A. Chacon
    Course Curriculum Development for the Future Cyberwarrior
    Mark A. Chacon
    Paperback
    $29.65
    BUY NOW
  • Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment - Nicholas A. Fraser
    Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment
    Nicholas A. Fraser
    Paperback
    $34.05
    BUY NOW
  • Patching the Wetware - Alexander D. Nelson
    Patching the Wetware
    Alexander D. Nelson
    Hardcover
    $43.95
    BUY NOW
  • Software Protection Against Reverse Engineering Tools - Joshua A. Benson
    Software Protection Against Reverse Engineering Tools
    Joshua A. Benson
    Paperback
    $35.15
    BUY NOW
  • Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework - Larissa A. O'Brien
    Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
    Larissa A. O'Brien
    Paperback
    $30.75
    BUY NOW
  • USCYBERCOM - Robert T. Bridges
    USCYBERCOM
    Robert T. Bridges
    Hardcover
    $42.85
    BUY NOW
  • Offensive Cyber Capability - Stephen M. Marshall
    Offensive Cyber Capability
    Stephen M. Marshall
    Hardcover
    $43.95
    BUY NOW
  • Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework - Jeffrey B. Scott
    Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework
    Jeffrey B. Scott
    Paperback
    $34.05
    BUY NOW
  • Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis - Lauren M. Wagoner
    Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
    Lauren M. Wagoner
    Paperback
    $34.05
    BUY NOW
  • Establishing the Human Firewall - Jamison W. Scheeres
    Establishing the Human Firewall
    Jamison W. Scheeres
    Hardcover
    $42.85
    BUY NOW
  • Spear Phishing Attack Detection - David T. Merritt
    Spear Phishing Attack Detection
    David T. Merritt
    Hardcover
    $45.05
    BUY NOW
  • Multi-Class Classification for Identifying JPEG Steganography Embedding Methods - Benjamin M. Rodriguez
    Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
    Benjamin M. Rodriguez
    Hardcover
    $48.35
    BUY NOW
  • Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems - Brendan K. Casey
    Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
    Brendan K. Casey
    Hardcover
    $42.85
    BUY NOW
  • Toward Cyber Omniscience - William P. Jensen
    Toward Cyber Omniscience
    William P. Jensen
    Hardcover
    $42.85
    BUY NOW
  • Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems - Brendan K. Casey
    Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
    Brendan K. Casey
    Paperback
    $29.65
    BUY NOW
  • An Analysis of Botnet Vulnerabilities - Sean W. Hudson
    An Analysis of Botnet Vulnerabilities
    Sean W. Hudson
    Paperback
    $30.75
    BUY NOW
  • Suspicion Modeling in Support of Cyber-Influence Operations/Tactics - Henry G. Paguirigan
    Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
    Henry G. Paguirigan
    Paperback
    $34.05
    BUY NOW
  • Toward Cyber Omniscience - William P. Jensen
    Toward Cyber Omniscience
    William P. Jensen
    Paperback
    $29.65
    BUY NOW
  • Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems - Matthew J. Mcalister
    Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems
    Matthew J. Mcalister
    Hardcover
    $45.05
    BUY NOW
  • An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment - Denzil L. Hellesen
    An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment
    Denzil L. Hellesen
    Hardcover
    $45.05
    BUY NOW
  • Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks - Kevin M. Finnigin
    Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks
    Kevin M. Finnigin
    Hardcover
    $45.05
    BUY NOW
  • Virtualization Technology Applied to Rootkit Defense - Douglas P. Medley
    Virtualization Technology Applied to Rootkit Defense
    Douglas P. Medley
    Paperback
    $30.75
    BUY NOW
  • U.S. Cyber Strategy Deterrence and Strategic Response - Brian G. Hermann
    U.S. Cyber Strategy Deterrence and Strategic Response
    Brian G. Hermann
    Hardcover
    $42.85
    BUY NOW
  • Interagency Organization for Cyberwar - Donovan L. Routsis
    Interagency Organization for Cyberwar
    Donovan L. Routsis
    Paperback
    $29.65
    BUY NOW
  • Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling - Ryan T. Ostler
    Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
    Ryan T. Ostler
    Hardcover
    $48.35
    BUY NOW
  • To Click or Not to Click - Richard Janoso
    To Click or Not to Click
    Richard Janoso
    Paperback
    $29.65
    BUY NOW
  • Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling - Ryan T. Ostler
    Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
    Ryan T. Ostler
    Paperback
    $35.15
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Paperback
    $34.05
    BUY NOW
  • Defining Our National Cyberspace Boundaries - United States Army: U.S. Army War Col...
    Defining Our National Cyberspace Boundaries
    Jeffery R. Schilling and United States Army: U.S. Army War Col...
    Paperback
    $29.65
    BUY NOW
  • What Senior Leaders Need to Know About Cyberspace - United States Army: U.S. Army War Col...
    What Senior Leaders Need to Know About Cyberspace
    Jeffrey L. Caton and United States Army: U.S. Army War Col...
    Paperback
    $29.65
    BUY NOW
  • Securing Smart Cities Through Modern Cryptography Technologies - Mishall Al-zubaidie
    Securing Smart Cities Through Modern Cryptography Technologies
    Mishall Al-zubaidie
    Paperback
    $436.75
    BUY NOW
  • Cyber Threat Hunters Handbook : Applying advanced analytics, automation, and collaborative intelligence for digital defense - David F. Pereira Quiceno
    Cyber Threat Hunters Handbook
    Applying advanced analytics, automation, and co...
    David F. Pereira Quiceno
    Paperback
    $67.09
    BUY NOW
  • AI vs. Humanity - The Battle for Human Relevance : How We Can Survive and Thrive in the Age of AI - Christopher Uchenwa
    AI vs. Humanity - The Battle for Human Relevance
    How We Can Survive and Thrive in the Age of AI
    Christopher Uchenwa
    Paperback
    $56.75
    BUY NOW
  • AI vs. Humanity - The Battle for Human Relevance : How We Can Survive and Thrive in the Age of AI - Christopher Uchenwa
    AI vs. Humanity - The Battle for Human Relevance
    How We Can Survive and Thrive in the Age of AI
    Christopher Uchenwa
    Hardcover
    $72.75
    BUY NOW
  • An Essay On The Art Of Decyphering - John Davys
    An Essay On The Art Of Decyphering
    John Davys and John Wallis
    Paperback
    $30.75
    BUY NOW
  • Practical Cloud Security Handbook : Secure cloud deployments with AWS, Azure, GCP, and IBM Cloud - Shiv Kumar
    Practical Cloud Security Handbook
    Secure cloud deployments with AWS, Azure, GCP, ...
    Shiv Kumar
    Paperback
    $68.19
    BUY NOW
  • Information Security - United States Government Accountabili...
    Information Security
    United States Government Accountabili...
    Paperback
    $29.65
    BUY NOW
  • Cyber Security Education - United States Congress House of Repre...
    Cyber Security Education
    United States Congress House of Repre...
    Hardcover
    $43.95
    BUY NOW
  • Public Key Infrastructure - United States Government Accountabili...
    Public Key Infrastructure
    United States Government Accountabili...
    Hardcover
    $42.85
    BUY NOW
  • Public Key Infrastructure - United States Government Accountabili...
    Public Key Infrastructure
    United States Government Accountabili...
    Paperback
    $29.65
    BUY NOW
  • Six Sigma for Continuous Improvement in Cybersecurity : A Guide for Students and Professionals - Emre Tokgoz
    Six Sigma for Continuous Improvement in Cybersecurity
    A Guide for Students and Professionals
    Emre Tokgoz
    Hardcover
    $64.99
    BUY NOW
  • THE OTHER SIDE OF THE FIREWALL : The Real-Life Stories of Movers, Shakers, & Glass Ceiling Breakers in Cybersecurity - Ryan J Williams Sr.
    THE OTHER SIDE OF THE FIREWALL
    The Real-Life Stories of Movers, Shakers, & Gla...
    Ryan J Williams Sr.
    Paperback
    $42.89
    BUY NOW
  • Advancements In Smart Card And Biometric Technology - United States Congress House of Repre...
    Advancements In Smart Card And Biometric Technology
    United States Congress House of Repre...
    Paperback
    $34.05
    BUY NOW
  • A Taxonomy for and Analysis of Anonymous Communications Networks - Douglas J. Kelly
    A Taxonomy for and Analysis of Anonymous Communications Networks
    Douglas J. Kelly
    Hardcover
    $52.75
    BUY NOW
  • A Study of Rootkit Stealth Techniques and Associated Detection Methods - Daniel D. Nerenberg
    A Study of Rootkit Stealth Techniques and Associated Detection Methods
    Daniel D. Nerenberg
    Hardcover
    $43.95
    BUY NOW
6941 Results | View 24 / 100
< 1 ... 67 68 69 70 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2025 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW