
Defending the Metaverse
Cybersecurity Strategies for the Next Generation Internet
By: Ravi Sheth (Editor), Mariya Ouaissa (Editor), Mariyam Ouaissa (Editor), Edeh Michael Onyema (Editor), Chandresh Parekha (Editor)
Hardcover | 15 June 2025 | Edition Number 1
At a Glance
Hardcover
RRP $231.00
$192.25
17%OFF
Expected to ship in at least 4 weeks
ISBN: 9781032946832
ISBN-10: 1032946830
Series: Advances in Cybersecurity Management
Published: 15th June 2025
Format: Hardcover
Language: English
Number of Pages: 356
Audience: College, Tertiary and University
Publisher: Taylor & Francis Ltd
Country of Publication: GB
Edition Number: 1
Dimensions (cm): 23.4 x 15.6 x 2.06
Weight (kg): 0.67
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In
This product is categorised by
- Non-FictionSocial Services & WelfareCrime & CriminologyCauses & Prevention of Crime
- Non-FictionComputing & I.T.Computer ScienceComputer Architecture & Logic Design
- Non-FictionLawJurisprudence & General IssuesThe Legal Aspects of Criminology
- Non-FictionComputing & I.T.Information Technology General IssueLegal Aspects of IT
- Non-FictionComputing & I.T.Computer SecurityPrivacy & Data Protection
- Non-FictionIndustry & Industrial StudiesService IndustriesSecurity Services
- Non-FictionComputing & I.T.Computer SecurityComputer Fraud & Hacking
- Non-FictionArts & EntertainmentArchitectureArchitectural Structure & Design
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionLawLaws of Specific JurisdictionsConstitutional & Administrative LawHuman Rights & Civil Liberties LawPrivacy Law
- Non-FictionComputing & I.T.Computer SecurityData Encryption