Hello! Enter your postcode for delivery time
Track My Order
Help Centre
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
    • FICTION

        Browse Fiction

      • New Releases
      • Bestselling
      • Bargains
      • Signed Copies
        • Popular Subjects

        • Australian Fiction
        • Classic Fiction
        • Crime & Mystery
        • Erotic Fiction
        • Fantasy
        • Graphic Novels & Manga
        • Historical
        • Modern & Contemporary
        •  

        • Poetry
        • Romance
        • Science Fiction
        • Thrillers & Mystery
        • Young Adult
        • Popular Authors

        • Margaret Atwood
        • Trent Dalton
        • Jane Harper
        • Stephen King
        • Dervla McTiernan
        • Liane Moriarty
        • Matthew Reilly
        • Sally Rooney
        • Popular Series

        • After
        • A Game of Thrones
        • Jack Reacher
        • Jack West
        • The Seven Sisters
        • Outlander
        • The Witcher
        • Wolf Hall

        More:

      • Award Winning Reads
      • Reviews and Staff Picks
      • Author Interviews
      • Podcasts
      • Explore All Fiction >
    • NON-FICTION

        Browse Non-Fiction

      • Bestselling
      • Bargains
      • Signed Copies
        • Popular Subjects

        • Animals & Nature
        • Arts & Entertainment
        • Biographies & True Stories
        • Business & Management
        • Comedy & Humour
        • Computing & IT
        • Cooking, Food & Drink
        • Crafts & Handiwork
        • Family & Health
        • Fashion & Style Guides
        • Fitness & Diet
        • Gardening
        • Green Lifestyle & Self-Sufficiency
        • History
        • House & Home
        •  

        • Language & Linguistics
        • Mind, Body, Spirit
        • Politics & Government
        • Popular Psychology
        • Religion & Beliefs
        • Science
        • Self Help & Personal Development
        • Society & Culture
        • Sport & Recreation
        • Transportation
        • Travel & Holidays
        • Biographies & True Stories

        • Arts & Entertainment Biographies
        • Historical Biographies
        • Sport Biographies
        • Travel Writing
        • True Crime
        • True Stories of Heroism
        • Cooking, Food & Drink

        • Baking & Desserts
        • Cooking for & with Children
        • Health & Wholefood Cookery
        • National & Regional Cuisine
        • TV & Celebrity Chefs
        • Vegetarian Cookery
        • Self Help & Personal Development

        • Advice on Careers & Success
        • Advice on Parenting
        • Family, Health & Relationships
        • Fitness & Diet
        • Mind, Body, Spirit
        • Popular Psychology
        • Professional

        • Business
        • Law
        • Medicine

        More:

      • Award Winning Reads
      • Reviews and Staff Picks
      • Author Interviews
      • Podcasts
      • Explore All Non-Fiction >
    • KIDS & YA

        Browse Kids & YA

      • New Releases
      • Bestselling
      • Bargains
      • Signed Copies
        • Browse by Age

        • Under 3
        • Pre-School (3-6)
        • School Age (6-9)
        • Pre-Teen (9-12)
        • Teen (12-15)
        • Young Adult (16+)
        • Popular Authors

        • Aaron Blabey
        • Anh Do
        • J.K. Rowling
        • Emily Rodda
        • Rick Riordan
        • Mem Fox
        • David Walliams
        • Cassandra Clare
        • Popular Series

        • Harry Potter
        • Bluey
        • The Treehouse Series
        • Nevermoor
        • Dog Man
        • Billie B Brown
        • Fun for Kids
        • Education

        • Education Central
        • Pre School
        • Primary School
        • Secondary School

        More:

      • CBCA Awards
      • Reviews and Staff Picks
      • Author Interviews
      • Podcasts
      • Explore All Kids & YA Books >
    • AUSTRALIAN
    • EDUCATION
        • Pre-School / Kindergarten

        • Pre-School & Day-Care
        • Starting School
        • Early Learning
        • ABC Reading Eggs
        • Picks for Toddlers
        • Picks for Pre-school
        • Sleeping Easy
        • Managing Manners
        • Big Picture Books
        • Understanding Emotions
        • Primary

        • Bestselling Primary Texts
        • Excel Guides for Primary
        • All About Sport
        • Reading
        • Maths
        • Primary Reference
        • CBCA Books
        • Secondary

        • Bestselling Secondary Texts
        • Accounting Business & Legal
        • Media, Arts & Religion
        • Reference & Study Guides
        • Guides to the School Certificates
        • Biology & Science
        • English & Literature
        • History
        • Languages
        • Maths
        •  

        • Poetry
        • Plays
        • Classic Fiction
        • Guides and Resources

        • NAPLAN
        • Anti-Bullying Books
        • Empowering Girls
        • Introducing Indigenous Culture
        • Oxford Dictionaries
      Education Central
      Explore All Education >
    • DIGITAL TEXTBOOKS
    • ACADEMIC
        • University

        • Accounting, Business & Finance
        • Biology and Sciences
        • Computing & Programming
        • Education
        • Engineering & Physics
        • English & Literature
        • Environment & Planning
        • Health Care
        •  

        • History
        • Language
        • Law
        • Mathematics & Statistics
        • Media, Communication & Arts
        • Medicine
        • Nursing
        • Politics
        •  

        • Psychology
        • Social Sciences
        • Study Skills
        • Vocational

        • Trades
        • Hospitality & Tourism
        • Business, Financial & Management
        • Nursing & Health Care
        • IT, Networking & Computer Repair
        • Education & Early Childhood
        • Social Working & Counselling
        • Design, Art, Fashion & Photography
      Explore All Academic >
    • BARGAINS
    • GIFT CERTIFICATES
Books > Non-Fiction > Computing & I.T. > Computer Security > Data Encryption
Get Free Shipping on orders over $89

Data Encryption

REFINE YOUR RESULTS

SUBJECTS

  • Computer Fraud & Hacking
  • Computer Viruses
  • Data Encryption
  • Firewalls
  • Privacy & Data Protection
  • Spam
  • Spyware

LISTS

  • All Books (8030)
  • Australian Authors Books (1)
  • Hot Prices (65)
  • Audiobooks (416)

AVAILABILITY

  • All Books (8030)
  • New Releases (211)
  • Coming Soon (123)
  • Ready To Ship (110)

PRICE

CUSTOMER RATING

  •  
    (15) 
  •  
    & Up (24) 
  •  
    & Up (25) 

FORMATS

LANGUAGE

  • Book
    (8030)
  • eBooks
    (8426)
  • Audiobooks
    (416)
  • Audio CDs
    (1)
8030 Results | View 24 / 100
< 1 ... 72 73 74 75 76 ... 81 >
Sort By
Sort By:
  • Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling - Ryan T. Ostler
    Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
    Ryan T. Ostler
    Paperback
    $35.15
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Paperback
    $34.05
    BUY NOW
  • Defining Our National Cyberspace Boundaries - United States Army: U.S. Army War Col...
    Defining Our National Cyberspace Boundaries
    Jeffery R. Schilling and United States Army: U.S. Army War Col...
    Paperback
    $29.65
    BUY NOW
  • What Senior Leaders Need to Know About Cyberspace - United States Army: U.S. Army War Col...
    What Senior Leaders Need to Know About Cyberspace
    Jeffrey L. Caton and United States Army: U.S. Army War Col...
    Paperback
    $29.65
    BUY NOW
  • Computer Vision and Image Processing : 9th International Conference, CVIP 2024, Chennai, India, December 19â
    Computer Vision and Image Processing
    9th International Conference, CVIP 2024, Chenna...
    Deep Gupta, Subrahmanyam Murala, Santosh Kumar Vipparthi, R. Balasubramanian and Jagadeesh Kakarla
    Paperback
    $249.00
    BUY NOW
  • Hacking Voice-Controllable Devices - Daniel OâÂ?Â?Keeffe
    Hacking Voice-Controllable Devices
    Daniel O�Keeffe, Sergio Esposito, Giampaolo Bella and Daniele Sgandurra
    Hardcover
    $259.01
    BUY NOW
  • Communications in Computer and Information Science : 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22¢
    Communications in Computer and Information Science
    9th International Conference, ICISSP 2023, Lisb...
    Gabriele Lenzini, Steven Furnell and Paolo Mori
    Paperback
    $179.00
    BUY NOW
  • Australian Stories
  • Modeling and Analyzing Security Protocols with Tamarin : A Comprehensive Guide - Cas Cremers
    Modeling and Analyzing Security Protocols with Tamarin
    A Comprehensive Guide
    Cas Cremers, Ralf Sasse, Jannik Dreier and David Basin
    Hardcover
    $89.99
    BUY NOW
  • Lecture Notes of the Institute for Computer Sciences, Social : First World Conference, WCCIS 2024, Kuala Lumpur, Malaysia, September 20¢
    Lecture Notes of the Institute for Computer Sciences, Social
    First World Conference, WCCIS 2024, Kuala Lumpu...
    Chunguo Li and Lip Yee Por
    Paperback
    $149.01
    BUY NOW
  • Computer Vision and Image Processing : 9th International Conference, CVIP 2024, Chennai, India, December 19â
    Computer Vision and Image Processing
    9th International Conference, CVIP 2024, Chenna...
    Deep Gupta, Subrahmanyam Murala, Santosh Kumar Vipparthi, R. Balasubramanian and Jagadeesh Kakarla
    Paperback
    $249.00
    BUY NOW
  • Communications in Computer and Information Science : 9th International Conference, CVIP 2024, Chennai, India, December 19-21, 2024, Revised Selected Papers, Part IV - Jagadeesh Kakarla
    Communications in Computer and Information Science
    9th International Conference, CVIP 2024, Chenna...
    Jagadeesh Kakarla, R. Balasubramanian and Subrahmanyam Murala
    Paperback
    $249.00
    BUY NOW
  • Lecture Notes in Computer Science : 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part I - Marc Fischlin
    Lecture Notes in Computer Science
    23rd International Conference, ACNS 2025, Munic...
    Marc Fischlin and Veelasha Moonsamy
    Paperback
    $219.00
    BUY NOW
  • Data and Applications Security and Privacy XXXIX : 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gj¸vik, Norway, June 23-24, 2025, Proceedings - Basit Shafiq
    Data and Applications Security and Privacy XXXIX
    39th IFIP WG 11.3 Annual Conference on Data and...
    Basit Shafiq and Sokratis Katsikas
    Paperback
    $109.00
    BUY NOW
  • Communications in Computer and Information Science : 40th International Conference, CATA 2025, San Francisco, CA, USA, March 17-18, 2025, Proceedings - Ajay Bandi
    Communications in Computer and Information Science
    40th International Conference, CATA 2025, San F...
    Ajay Bandi and Mohammad Hossain
    Paperback
    $129.00
    BUY NOW
  • How to Drag a Body : Survival Tricks for Hacking, Hurricanes, and Hazards Life Might Throw at You - Judith Matloff
    How to Drag a Body
    Survival Tricks for Hacking, Hurricanes, and Ha...
    Judith Matloff
    Paperback
    RRP $27.49
    $26.75
    BUY NOW
  • Future Air Force Operations in Cyberspace - Air University (U.S.) Air War College
    Future Air Force Operations in Cyberspace
    John F. Schrader and Air University (U.S.) Air War College
    Hardcover
    $42.85
    BUY NOW
  • Cyberpower as a Coercive Instrument - Air University (U.S.). School of Adva...
    Cyberpower as a Coercive Instrument
    Ann M. Halle and Air University (U.S.). School of Adva...
    Hardcover
    $43.95
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Hardcover
    $43.95
    BUY NOW
  • Presentation of AFCYBER Forces - Air War College
    Presentation of AFCYBER Forces
    Todd A. Brooks and Air War College
    Paperback
    $30.75
    BUY NOW
  • Cybermad - David A. Gale
    Cybermad
    David A. Gale
    Paperback
    $29.65
    BUY NOW
  • Cyber-Based C4ISR Asset - Air University (U.S.) Air Command and...
    Cyber-Based C4ISR Asset
    John W. Neptune and Air University (U.S.) Air Command and...
    Hardcover
    $42.85
    BUY NOW
  • Future Air Force Operations in Cyberspace - Air University (U.S.) Air War College
    Future Air Force Operations in Cyberspace
    John F. Schrader and Air University (U.S.) Air War College
    Paperback
    $29.65
    BUY NOW
  • Cyberpower as a Coercive Instrument - Air University (U.S.). School of Adva...
    Cyberpower as a Coercive Instrument
    Ann M. Halle and Air University (U.S.). School of Adva...
    Paperback
    $30.75
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Paperback
    $30.75
    BUY NOW
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Hardcover
    $43.95
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • Cyberspace - Air University (U.S.). Air Force Fell...
    Cyberspace
    Todd M. Piergrossi and Air University (U.S.). Air Force Fell...
    Hardcover
    $42.85
    BUY NOW
  • Cyber-Based C4ISR Asset - Air University (U.S.) Air Command and...
    Cyber-Based C4ISR Asset
    John W. Neptune and Air University (U.S.) Air Command and...
    Paperback
    $29.65
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Hardcover
    $49.45
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Hardcover
    $45.05
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Hardcover
    $42.85
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Hardcover
    $43.95
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Hardcover
    $45.05
    BUY NOW
  • A Line-of-Sight Sensor Network for Wide Area Video Surveillance - Jamie R. Morrison
    A Line-of-Sight Sensor Network for Wide Area Video Surveillance
    Jamie R. Morrison
    Hardcover
    $48.35
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Hardcover
    $48.35
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Hardcover
    $42.85
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Hardcover
    $49.45
    BUY NOW
  • Cyberspace - Air University (U.S.). Air Force Fell...
    Cyberspace
    Todd M. Piergrossi and Air University (U.S.). Air Force Fell...
    Paperback
    $29.65
    BUY NOW
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Paperback
    $30.75
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Paperback
    $36.25
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Paperback
    $30.75
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Paperback
    $29.65
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Paperback
    $34.05
    BUY NOW
  • A Line-of-Sight Sensor Network for Wide Area Video Surveillance - Jamie R. Morrison
    A Line-of-Sight Sensor Network for Wide Area Video Surveillance
    Jamie R. Morrison
    Paperback
    $35.15
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Paperback
    $29.65
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Hardcover
    $43.95
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Hardcover
    $45.05
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Paperback
    $35.15
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Paperback
    $34.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Hardcover
    $43.95
    BUY NOW
  • Simple Public Key Infrastructure Analysis Protocol Analysis and Design - Alexander G. Vidergar
    Simple Public Key Infrastructure Analysis Protocol Analysis and Design
    Alexander G. Vidergar
    Hardcover
    $43.95
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Paperback
    $36.25
    BUY NOW
  • Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function - Jeffrey L. Falkinburg
    Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
    Jeffrey L. Falkinburg
    Hardcover
    $45.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Paperback
    $30.75
    BUY NOW
  • Course Curriculum Development for the Future Cyberwarrior - Mark A. Chacon
    Course Curriculum Development for the Future Cyberwarrior
    Mark A. Chacon
    Hardcover
    $42.85
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Paperback
    $30.75
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Paperback
    $34.05
    BUY NOW
  • Scalable and Fault Tolerant Group Key Management - Nicholas A. Lupien
    Scalable and Fault Tolerant Group Key Management
    Nicholas A. Lupien
    Hardcover
    $43.95
    BUY NOW
  • Android Protection System - Jonathan D. Stueckle
    Android Protection System
    Jonathan D. Stueckle
    Hardcover
    $43.95
    BUY NOW
  • Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection - Matthew A. Zimmerman
    Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
    Matthew A. Zimmerman
    Hardcover
    $43.95
    BUY NOW
  • An Analysis of Biometric Technology as an Enabler to Information Assurance - Darren A. Deschaine
    An Analysis of Biometric Technology as an Enabler to Information Assurance
    Darren A. Deschaine
    Paperback
    $30.75
    BUY NOW
  • Active Computer Network Defense - Eric J. Holdaway
    Active Computer Network Defense
    Eric J. Holdaway
    Hardcover
    $42.85
    BUY NOW
  • Enemy at the Gateways - Nathan B. Paddock
    Enemy at the Gateways
    Nathan B. Paddock
    Hardcover
    $42.85
    BUY NOW
  • Psychological Operations Within the Cyberspace Domain - Prentiss O. Baker
    Psychological Operations Within the Cyberspace Domain
    Prentiss O. Baker
    Hardcover
    $42.85
    BUY NOW
  • Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation - Michael J. Myers
    Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
    Michael J. Myers
    Paperback
    $30.75
    BUY NOW
  • Operationalizing Offensive Social Engineering for the Air Force - Bryan E. Skarda
    Operationalizing Offensive Social Engineering for the Air Force
    Bryan E. Skarda
    Paperback
    $30.75
    BUY NOW
  • Development of an Malicious Insider Composite Vulnerability Assessment Methodology - William H. King
    Development of an Malicious Insider Composite Vulnerability Assessment Methodology
    William H. King
    Paperback
    $34.05
    BUY NOW
  • Interpreting Chinese Cyber Attacks of 2007 - Laura L. Knapp
    Interpreting Chinese Cyber Attacks of 2007
    Laura L. Knapp
    Hardcover
    $43.95
    BUY NOW
  • To Click or Not to Click - Richard Janoso
    To Click or Not to Click
    Richard Janoso
    Hardcover
    $42.85
    BUY NOW
  • U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States - Brian G. Hermann
    U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
    Brian G. Hermann
    Paperback
    $29.65
    BUY NOW
  • Interagency Coordination at Net Speed - James Barkley
    Interagency Coordination at Net Speed
    James Barkley
    Paperback
    $30.75
    BUY NOW
  • An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS - Danny R. Bias
    An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS
    Danny R. Bias
    Paperback
    $30.75
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Hardcover
    $45.05
    BUY NOW
  • Information Operations Primer - United States Army: U.S. Army War Col...
    Information Operations Primer
    United States Army: U.S. Army War Col...
    Hardcover
    $49.45
    BUY NOW
  • Cybersecurity Essentials for Small Businesses : Protect Your Business from Breaches, Ransomware, and Compliance Failures - Eric LeBouthillier
    Cybersecurity Essentials for Small Businesses
    Protect Your Business from Breaches, Ransomware...
    Eric LeBouthillier
    Paperback
    RRP $32.99
    $32.75
    BUY NOW
  • Quantum Computing, Cyber Security and Cryptography : Issues, Technologies, Algorithms, Programming and Strategies - Deepika Ghai
    Quantum Computing, Cyber Security and Cryptography
    Issues, Technologies, Algorithms, Programming a...
    Deepika Ghai, Vidyapati Kumar, Sardar M. N. Islam and S. B. Goyal
    Hardcover
    $229.00
    BUY NOW
  • Communications in Computer and Information Science : 9th International Conference, CVIP 2024, Chennai, India, December 19¢
    Communications in Computer and Information Science
    9th International Conference, CVIP 2024, Chenna...
    Deep Gupta, Subrahmanyam Murala, Santosh Kumar Vipparthi, R. Balasubramanian and Jagadeesh Kakarla
    Paperback
    $149.01
    BUY NOW
  • Management for Professionals : Management for Professionals - Haifeng Bai
    Management for Professionals
    Management for Professionals
    Haifeng Bai, Yang Wang, Shusong Ba and Haokang Thomas Zhu
    Hardcover
    $179.00
    BUY NOW
  • Cryptocurrency : A Guide to Navigating the World of Digital Assets - Richard Skiba
    Cryptocurrency
    A Guide to Navigating the World of Digital Assets
    Richard Skiba
    Paperback
    $60.49
    BUY NOW
  • Cyber Suraksha : A Common Man's Handbook to Outsmart Online Crimes - Abhirup Guha
    Cyber Suraksha
    A Common Man's Handbook to Outsmart Online Crimes
    Abhirup Guha
    Paperback
    $45.75
    BUY NOW
  • Public and Private Governance of Cybersecurity : Challenges and Potential - Tomoko Ishikawa
    Public and Private Governance of Cybersecurity
    Challenges and Potential
    Tomoko Ishikawa and Yarik Kryvoi
    Paperback
    RRP $56.95
    $56.75
    BUY NOW
  • Trends and Challenges of Electronic Finance : Perspectives from Emerging Markets - Ananda S.
    Trends and Challenges of Electronic Finance
    Perspectives from Emerging Markets
    Ananda S., Tamanna Dalwai and Dharmendra Singh
    Hardcover
    $279.00
    BUY NOW
  • Mathematical Methods in the Digital Age : Achieving Cybersecurity and AI Strategies - Hemant Kumar Saini
    Mathematical Methods in the Digital Age
    Achieving Cybersecurity and AI Strategies
    Hemant Kumar Saini, T. Ananth Kumar, Sardar M.N. Islam and S.B. Goyal
    Hardcover
    $128.67
    BUY NOW
  • Lecture Notes in Computer Science : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I - Willy Susilo
    Lecture Notes in Computer Science
    30th Australasian Conference, ACISP 2025, Wollo...
    Willy Susilo and Josef Pieprzyk
    Paperback
    $139.00
    BUY NOW
  • Lecture Notes in Computer Science : ARES 2025 International Workshops, Ghent, Belgium, August 11¢
    Lecture Notes in Computer Science
    ARES 2025 International Workshops, Ghent, Belgi...
    Bart Coppens, Vincent Naessens, Bruno Volckaert and Bjorn De Sutter
    Paperback
    $109.00
    BUY NOW
  • Lecture Notes in Computer Science : ARES 2025 EU Projects Symposium Workshops, Ghent, Belgium, August 11¢
    Lecture Notes in Computer Science
    ARES 2025 EU Projects Symposium Workshops, Ghen...
    Bjorn De Sutter, Vincent Naessens and Florian Skopik
    Paperback
    $109.00
    BUY NOW
  • Undergraduate Topics in Computer Science : A Course Companion Resource - Juan Tapiador
    Undergraduate Topics in Computer Science
    A Course Companion Resource
    Juan Tapiador
    Paperback
    $84.99
    BUY NOW
  • Lecture Notes in Computer Science : ARES 2025 International Workshops, Ghent, Belgium, August 11¢
    Lecture Notes in Computer Science
    ARES 2025 International Workshops, Ghent, Belgi...
    Bart Coppens, Vincent Naessens, Bruno Volckaert and Bjorn De Sutter
    Paperback
    $99.00
    BUY NOW
  • Lecture Notes in Computer Science : ARES 2025 International Workshops, Ghent, Belgium, August 11¢
    Lecture Notes in Computer Science
    ARES 2025 International Workshops, Ghent, Belgi...
    Bart Coppens, Vincent Naessens, Bruno Volckaert and Bjorn De Sutter
    Paperback
    $109.00
    BUY NOW
  • Linear Cryptanalysis - Tim Beyne
    Linear Cryptanalysis
    Tim Beyne and Vincent Rijmen
    Hardcover
    RRP $119.95
    $103.75
    14%
    OFF
    BUY NOW
  • Establishing Security Operations Center : Cyber incident detection analysis and threat hunting for robust security operations (English Edition) - Sameer Vasant Kulkarni
    Establishing Security Operations Center
    Cyber incident detection analysis and threat hu...
    Sameer Vasant Kulkarni
    Paperback
    $68.19
    BUY NOW
  • Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14â
    Information Security and Privacy
    30th Australasian Conference, ACISP 2025, Wollo...
    Josef Pieprzyk and Willy Susilo
    Paperback
    $139.00
    BUY NOW
  • Cyber Forensics and Digital Security : AI-Driven Cybercrime Investigations and Risk Management - Olakunle Bayode Falana
    Cyber Forensics and Digital Security
    AI-Driven Cybercrime Investigations and Risk Ma...
    Olakunle Bayode Falana
    Hardcover
    $27.49
    BUY NOW
  • Practical Cloud Security Handbook : Secure cloud deployments with AWS, Azure, GCP, and IBM Cloud (English Edition) - Shiv Kumar
    Practical Cloud Security Handbook
    Secure cloud deployments with AWS, Azure, GCP, ...
    Shiv Kumar
    Paperback
    $68.19
    BUY NOW
  • Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14â
    Information Security and Privacy
    30th Australasian Conference, ACISP 2025, Wollo...
    Josef Pieprzyk and Willy Susilo
    Paperback
    $129.00
    BUY NOW
  • Financial Cryptography and Data Security : 28th International Conference, FC 2024, Willemstad, Curacao, March 4â
    Financial Cryptography and Data Security
    28th International Conference, FC 2024, Willems...
    Elaine Shi and Jeremy Clark
    Paperback
    $109.00
    BUY NOW
8030 Results | View 24 / 100
< 1 ... 72 73 74 75 76 ... 81 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW