Hello! Enter your postcode for delivery time
Track My Order
Help Centre
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
  • FICTION

      Browse Fiction

    • New Releases
    • Coming Soon
    • Bestselling
      • Popular Subjects

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Children's Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Popular Authors

      • Danielle Steel
      • E L James
      • James Patterson
      • Kerry Greenwood
      • Lee Child
      • Michael Connelly
      • Peter Corris
      • Popular Series

      • Text Classics
    Explore All Fiction >
  • NON-FICTION

      Browse Non-Fiction

    • Bestselling
      • Subjects

      • Accounting & Finance
      • Animals & Nature
      • Antiques & Collectables
      • Archaeology
      • Arts & Entertainment
      • Biographies & True Stories
      • Business & Management
      • Children's Non-Fiction
      • Comedy & Humour
      • Computing & I.T.
      • Cooking, Food & Drink
      • Crafts & Handiwork
      • Dictionaries
      • Earth Sciences & Environment
      • Economics
      • Education
      •  

      • Engineering & Technology
      • Family & Health
      • Gardening
      • History
      • Hobbies, Games & Puzzles
      • Home & House Maintenance
      • Industry & Industrial Studies
      • Language & Linguistics
      • Law
      • Library & Info Sciences
      • Lifestyle & Fashion
      • Literature, Poetry & Plays
      • Mathematics
      • Medicine
      • Mind, Body, Spirit
      • Philosophy
      •  

      • Politics & Government
      • Psychology
      • Reference & Encyclopaedias
      • Religion & Beliefs
      • Science
      • Self-Help & Personal Development
      • Social Services & Welfare
      • Society & Culture
      • Sociology & Anthropology
      • Sports & Recreation
      • Teaching English (ELT)
      • Transportation
      • Travel & Holidays
      • Travel Maps & Atlases
      • Warfare & Defence
    Explore All Non-Fiction >
  • TEXTBOOKS
  • KIDS & YA

      Browse Kids & YA

    • New Releases
    • Bestselling
      • Popular Subjects

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
    Explore All Kids & YA
  • EREADERS
  • KOBO PLUS
eBooks > Non-Fiction > Computing & I.T. > Computer Security
Get Free Shipping on orders over $79

Computer Security

REFINE YOUR RESULTS

SUBJECTS

  • Computer Viruses
  • Data Encryption

LISTS

  • All eBooks (8784)
  • Australian Authors Books (1)
  • Books (9510)
  • Audiobooks (499)
  • eTextbooks (6760)

AVAILABILITY

  • All eBooks (8784)
  • New Releases (349)
  • Coming Soon (38)
  • Subscription eBooks (1453)

PRICE

CUSTOMER RATING

  •  
    (2) 
  •  
    & Up (4) 
  •  
    & Up (4) 

FORMATS

LANGUAGE

  • eBook
    (8784)
  • Books
    (9510)
  • Audiobooks
    (499)
  • Audio CDs
    (1)
  • Stationery
    (1)
8784 Results | View 24 / 100
< 1 ... 5 6 7 8 9 ... 88 >
Sort By
Sort By:
  • Multimedia Encryption and Watermarking - Borko Furht
    Multimedia Encryption and Watermarking
    Borko Furht, Edin Muharemagic and Daniel Socek
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Digital Signatures : An Introduction - Jonathan Katz
    Digital Signatures
    An Introduction
    Jonathan Katz
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Unconstrained Face Recognition - Shaohua Kevin Zhou
    Unconstrained Face Recognition
    Shaohua Kevin Zhou, Rama Chellappa and Wenyi Zhao
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Privacy Preserving Data Mining - Jaideep Vaidya
    Privacy Preserving Data Mining
    Jaideep Vaidya, Christopher W. Clifton and Yu Michael Zhu
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Secure Integrated Circuits and Systems : Integrated Circuits and Systems - Ingrid M.R. Verbauwhede
    Secure Integrated Circuits and Systems
    Integrated Circuits and Systems
    Ingrid M.R. Verbauwhede
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Network Security : Computer Science (R0) - Scott C.-H. Huang
    Network Security
    Computer Science (R0)
    Scott C.-H. Huang, David MacCallum and Ding-Zhu Du
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Spyware and Adware - John Aycock
    Spyware and Adware
    John Aycock
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Afterpay
  • Electronic Healthcare Information Security - Charles A. Shoniregun
    Electronic Healthcare Information Security
    Charles A. Shoniregun, Kudakwashe Dube and Fredrick Mtenzi
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Proceedings of the 3rd European Conference on Computer Network Defense - Vasilios Siris
    Proceedings of the 3rd European Conference on Computer Network Defense
    Vasilios Siris
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Network Intrusion Detection and Prevention : Concepts and Techniques - Ali A. Ghorbani
    Network Intrusion Detection and Prevention
    Concepts and Techniques
    Ali A. Ghorbani, Wei Lu and Mahbod Tavallaee
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Encryption for Digital Content - Aggelos Kiayias
    Encryption for Digital Content
    Aggelos Kiayias and Serdar Pehlivanoglu
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Cyber Situational Awareness : Issues and Research - Sushil Jajodia
    Cyber Situational Awareness
    Issues and Research
    Sushil Jajodia, ?Peng Liu and ?Vipin Swarup
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Trust Management for Service-Oriented Environments - Zaki Malik
    Trust Management for Service-Oriented Environments
    Zaki Malik and Athman Bouguettaya
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Multi-Modal User Interactions in Controlled Environments : Multi-Modal User Interactions In Controlled Environments - Chaabane Djeraba
    Multi-Modal User Interactions in Controlled Environments
    Multi-Modal User Interactions In Controlled Env...
    Chaabane Djeraba, Adel Lablack and Yassine Benabbas
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Security Informatics : Annals of Information Systems : Book 9 - Christopher C. Yang
    Security Informatics
    Annals of Information Systems : Book 9
    Christopher C. Yang, ?Michael Chau and ?JauHwang Wang
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Security in Embedded Devices : Embedded Systems - Catherine H. Gebotys
    Security in Embedded Devices
    Embedded Systems
    Catherine H. Gebotys
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Open Source Software for Digital Forensics : Springer Nature Proceedings Computer Science - Ewa Huebner
    Open Source Software for Digital Forensics
    Springer Nature Proceedings Computer Science
    Ewa Huebner and ?Stefano Zanero
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Association Rule Hiding for Data Mining - Aris Gkoulalas-Divanis
    Association Rule Hiding for Data Mining
    Aris Gkoulalas-Divanis and Vassilios S. Verykios
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Adaptive Cryptographic Access Control - Anne V. D. M. Kayem
    Adaptive Cryptographic Access Control
    Anne V. D. M. Kayem, Selim G. Akl and Patrick Martin
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Insider Threats in Cyber Security : Advances in Information Security - Christian W Probst
    Insider Threats in Cyber Security
    Advances in Information Security
    Christian W Probst, Jeffrey Hunker and Dieter Gollmann
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Preserving Privacy in Data Outsourcing - Sara Foresti
    Preserving Privacy in Data Outsourcing
    Sara Foresti
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • CyberForensics : Understanding Information Security Investigations - Jennifer Bayuk
    CyberForensics
    Understanding Information Security Investigations
    Jennifer Bayuk
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Embedded Java Security : Security for Mobile Devices - Mourad Debbabi
    Embedded Java Security
    Security for Mobile Devices
    Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Handbook of Data Compression - David Salomon
    Handbook of Data Compression
    David Salomon and Giovanni Motta
    eText
    Instant Online Reading*
    $269.01
    BUY EBOOK
  • Making Systems Safer : Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, UK, 9-11th February 2010 - Chris Dale
    Making Systems Safer
    Proceedings of the Eighteenth Safety-Critical S...
    Chris Dale and Tom Anderson
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Computational Methods in Biometric Authentication : Statistical Methods for Performance Evaluation - Michael E. Schuckers
    Computational Methods in Biometric Authentication
    Statistical Methods for Performance Evaluation
    Michael E. Schuckers
    eBook
    Instant Digital Delivery
    RRP $239.00
    $215.99
    BUY EBOOK
  • Privacy and Anonymity in Information Management Systems : New Techniques for New Practical Problems - Jordi Nin
    Privacy and Anonymity in Information Management Systems
    New Techniques for New Practical Problems
    Jordi Nin and ?Javier Herranz
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Security for Web Services and Service-Oriented Architectures - Elisa Bertino
    Security for Web Services and Service-Oriented Architectures
    Elisa Bertino, Lorenzo Martino, Federica Paci and Anna Squicciarini
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • The Global Cybercrime Industry : Economic, Institutional and Strategic Perspectives - Nir Kshetri
    The Global Cybercrime Industry
    Economic, Institutional and Strategic Perspectives
    Nir Kshetri
    eBook
    Instant Digital Delivery
    RRP $169.00
    $152.99
    BUY EBOOK
  • Model-Driven Risk Analysis : The CORAS Approach - Mass Soldal Lund
    Model-Driven Risk Analysis
    The CORAS Approach
    Mass Soldal Lund, Bjørnar Solhaug and Ketil Stølen
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Cybercrimes : A Multidisciplinary Analysis - Sumit Ghosh
    Cybercrimes
    A Multidisciplinary Analysis
    Sumit Ghosh and ?Elliot Turrini
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Efficient Secure Two-Party Protocols : Techniques and Constructions - Carmit Hazay
    Efficient Secure Two-Party Protocols
    Techniques and Constructions
    Carmit Hazay and Yehuda Lindell
    eText
    Instant Online Reading*
    $269.01
    BUY EBOOK
  • Advanced Statistical Steganalysis : Information Security and Cryptography - Rainer Böhme
    Advanced Statistical Steganalysis
    Information Security and Cryptography
    Rainer Böhme
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Towards Hardware-Intrinsic Security : Foundations and Practice - Ahmad-Reza Sadeghi
    Towards Hardware-Intrinsic Security
    Foundations and Practice
    Ahmad-Reza Sadeghi
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Data Protection in a Profiled World - Serge Gutwirth
    Data Protection in a Profiled World
    Serge Gutwirth, ?Yves Poullet and ?Paul De Hert
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • IT Security Management : IT Securiteers - Setting up an IT Security Function - Alberto Partida
    IT Security Management
    IT Securiteers - Setting up an IT Security Func...
    Alberto Partida and Diego Andina
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Machine Learning and Systems Engineering : Engineering (R0) - Sio-Iong Ao
    Machine Learning and Systems Engineering
    Engineering (R0)
    Sio-Iong Ao
    eText
    Instant Online Reading*
    $329.00
    BUY EBOOK
  • SPSS for Starters : Biomedical and Life Sciences (R0) - Ton J. Cleophas
    SPSS for Starters
    Biomedical and Life Sciences (R0)
    Ton J. Cleophas and Aeilko H. Zwinderman
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations : Information warfare; social, legal, and international issues; and security foundations - Hossein Bidgoli
    Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations
    Information warfare; social, legal, and interna...
    Hossein Bidgoli
    eText
    Instant Online Reading*
    $621.49
    BUY EBOOK
  • Legislating Privacy : Technology, Social Values, and Public Policy - Priscilla M. Regan
    Legislating Privacy
    Technology, Social Values, and Public Policy
    Priscilla M. Regan
    eBook
    Instant Digital Delivery
    RRP $50.82
    $45.99
    BUY EBOOK
  • Economics of Identity Theft : Avoidance, Causes and Possible Cures - L. Jean Camp
    Economics of Identity Theft
    Avoidance, Causes and Possible Cures
    L. Jean Camp
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • None of Your Business : World Data Flows, Electronic Commerce, and the European Privacy Directive - Peter P. Swire
    None of Your Business
    World Data Flows, Electronic Commerce, and the ...
    Peter P. Swire and Robert E. Litan
    eText
    Instant Online Reading*
    $40.49
    BUY EBOOK
  • Global Challenges for Identity Policies : Technology, Work and Globalization - E. Whitley
    Global Challenges for Identity Policies
    Technology, Work and Globalization
    E. Whitley and G. Hosein
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Security Law and Methods - James Pastor
    Security Law and Methods
    James Pastor
    eBook
    Instant Digital Delivery
    RRP $72.95
    $65.99
    BUY EBOOK
  • High-Technology Crime Investigator's Handbook : Establishing and Managing a High-Technology Crime Prevention Program - Gerald L. Kovacich
    High-Technology Crime Investigator's Handbook
    Establishing and Managing a High-Technology Cri...
    Gerald L. Kovacich and William C. Boni
    eBook
    Instant Digital Delivery
    RRP $59.95
    $54.99
    BUY EBOOK
  • How to Cheat at IT Project Management : How to Cheat - Susan Snedaker
    How to Cheat at IT Project Management
    How to Cheat
    Susan Snedaker
    eBook
    Instant Digital Delivery
    RRP $70.86
    $63.99
    BUY EBOOK
  • Microsoft Log Parser Toolkit : A complete toolkit for Microsoft's undocumented log analysis tool - Gabriele Giuseppini
    Microsoft Log Parser Toolkit
    A complete toolkit for Microsoft's undocumented...
    Gabriele Giuseppini and Mark Burnett
    eText
    Instant Online Reading*
    $52.95
    BUY EBOOK
  • Sarbanes-Oxley Compliance Using COBIT and Open Source Tools : IT Compliance Using COBIT and Open Source Tools - Christian B Lahti
    Sarbanes-Oxley Compliance Using COBIT and Open Source Tools
    IT Compliance Using COBIT and Open Source Tools
    Christian B Lahti and Roderick Peterson
    eText
    Instant Online Reading*
    $57.15
    BUY EBOOK
  • Stealing the Network : How to Own an Identity - Ryan Russell
    Stealing the Network
    How to Own an Identity
    Ryan Russell
    eText
    Instant Online Reading*
    $62.95
    BUY EBOOK
  • WarDriving and Wireless Penetration Testing : Penetration Testing - Chris Hurley
    WarDriving and Wireless Penetration Testing
    Penetration Testing
    Chris Hurley
    eText
    Instant Online Reading*
    $64.94
    BUY EBOOK
  • How to Cheat at IIS 7 Server Administration : How to Cheat - Chris Adams
    How to Cheat at IIS 7 Server Administration
    How to Cheat
    Chris Adams
    eText
    Instant Online Reading*
    $62.95
    BUY EBOOK
  • Cyber Crime Investigations : Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors - Anthony Reyes
    Cyber Crime Investigations
    Bridging the Gaps Between Security Professional...
    Anthony Reyes
    eText
    Instant Online Reading*
    $74.95
    BUY EBOOK
  • Information Assurance : Dependability and Security in Networked Systems - Yi Qian
    Information Assurance
    Dependability and Security in Networked Systems
    Yi Qian
    eText
    Instant Online Reading*
    $87.95
    BUY EBOOK
  • Juniper(r) Networks Secure Access SSL VPN Configuration Guide - Rob Cameron
    Juniper(r) Networks Secure Access SSL VPN Configuration Guide
    Rob Cameron
    eText
    Instant Online Reading*
    $78.95
    BUY EBOOK
  • The Best Damn Exchange, SQL and IIS Book Period : Fully Integrated Coverage of Microsoft ?s Core Server Products in a Single Volumen - Henrik Walther
    The Best Damn Exchange, SQL and IIS Book Period
    Fully Integrated Coverage of Microsoft ?s Core ...
    Henrik Walther, Mark Horninger and Chris Adams
    eBook
    Instant Digital Delivery
    RRP $95.41
    $85.99
    BUY EBOOK
  • Nmap in the Enterprise : Your Guide to Network Scanning - Angela Orebaugh
    Nmap in the Enterprise
    Your Guide to Network Scanning
    Angela Orebaugh and Becky Pinkard
    eBook
    Instant Digital Delivery
    RRP $95.41
    $85.99
    BUY EBOOK
  • Secrets Stolen, Fortunes Lost : Preventing Intellectual Property Theft and Economic Espionage in the 21st Century - Christopher Burgess
    Secrets Stolen, Fortunes Lost
    Preventing Intellectual Property Theft and Econ...
    Christopher Burgess and Richard Power
    eBook
    Instant Digital Delivery
    RRP $109.04
    $98.99
    BUY EBOOK
  • Malware Forensics : Investigating and Analyzing Malicious Code - Cameron H. Malin
    Malware Forensics
    Investigating and Analyzing Malicious Code
    Cameron H. Malin
    eText
    Instant Online Reading*
    $87.93
    BUY EBOOK
  • GFI Network Security and PCI Compliance Power Tools - Brien Posey
    GFI Network Security and PCI Compliance Power Tools
    Brien Posey
    eText
    Instant Online Reading*
    $78.95
    BUY EBOOK
  • Building a Digital Forensic Laboratory : Establishing and Managing a Successful Facility - Andrew Jones
    Building a Digital Forensic Laboratory
    Establishing and Managing a Successful Facility
    Andrew Jones
    eText
    Instant Online Reading*
    $83.55
    BUY EBOOK
  • The Real Citrix CCA Exam Preparation Kit : Prepare for XenApp 5.0 - Shawn Tooley
    The Real Citrix CCA Exam Preparation Kit
    Prepare for XenApp 5.0
    Shawn Tooley
    eText
    Instant Online Reading*
    $80.95
    BUY EBOOK
  • Windows Forensic Analysis DVD Toolkit - Harlan Carvey
    Windows Forensic Analysis DVD Toolkit
    Harlan Carvey
    eText
    Instant Online Reading*
    $87.99
    BUY EBOOK
  • Workplace Violence : Planning for Prevention and Response - Kim Kerr
    Workplace Violence
    Planning for Prevention and Response
    Kim Kerr
    eText
    Instant Online Reading*
    $91.25
    BUY EBOOK
  • The Initial Psychotherapy Interview : A Gay Man Seeks Treatment - Charles Silverstein
    The Initial Psychotherapy Interview
    A Gay Man Seeks Treatment
    Charles Silverstein
    eText
    Instant Online Reading*
    $81.95
    BUY EBOOK
  • Managing Information Risk and the Economics of Security - M. Eric Johnson
    Managing Information Risk and the Economics of Security
    M. Eric Johnson
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Global Initiatives to Secure Cyberspace : An Emerging Landscape - Michael Portnoy
    Global Initiatives to Secure Cyberspace
    An Emerging Landscape
    Michael Portnoy and ?Seymour Goodman
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Secure Group Communications Over Data Networks - Xukai Zou
    Secure Group Communications Over Data Networks
    Xukai Zou, Byrav Ramamurthy and Spyros S. Magliveras
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Intrusion Detection and Correlation : Challenges and Solutions - Christopher Kruegel
    Intrusion Detection and Correlation
    Challenges and Solutions
    Christopher Kruegel, Fredrik Valeur and Giovanni Vigna
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Privacy, Security and Trust within the Context of Pervasive Computing - Philip Robinson
    Privacy, Security and Trust within the Context of Pervasive Computing
    Philip Robinson, ?Harald Vogt and ?Waleed Wagealla
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Coding for Data and Computer Communications - David Salomon
    Coding for Data and Computer Communications
    David Salomon
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Trusted Computing Platforms : Design and Applications - Sean W. Smith
    Trusted Computing Platforms
    Design and Applications
    Sean W. Smith
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Computer Security in the 21st Century - D.T. Lee
    Computer Security in the 21st Century
    D.T. Lee, ?S. P. Shieh and ?J. Doug Tygar
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Managing Cyber Threats : Issues, Approaches, and Challenges - Vipin Kumar
    Managing Cyber Threats
    Issues, Approaches, and Challenges
    Vipin Kumar, ?Jaideep Srivastava and ?Aleksandar Lazarevic
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Optical and Digital Techniques for Information Security - Bahram Javidi
    Optical and Digital Techniques for Information Security
    Bahram Javidi
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Security in E-Learning - Edgar R. Weippl
    Security in E-Learning
    Edgar R. Weippl
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Net-Centric Approaches to Intelligence and National Security - Roy Ladner
    Net-Centric Approaches to Intelligence and National Security
    Roy Ladner and ?Frederick E. Petry
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Impacts and Risk Assessment of Technology for Internet Security : Enabled Information Small-Medium Enterprises (TEISMES) - Charles A. Shoniregun
    Impacts and Risk Assessment of Technology for Internet Security
    Enabled Information Small-Medium Enterprises (T...
    Charles A. Shoniregun
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Brute Force : Cracking the Data Encryption Standard - Matt Curtin
    Brute Force
    Cracking the Data Encryption Standard
    Matt Curtin
    eText
    Instant Online Reading*
    $50.00
    BUY EBOOK
  • Handbook of Face Recognition - Stan Z. Li
    Handbook of Face Recognition
    Stan Z. Li and ?Anil K. Jain
    eText
    Instant Online Reading*
    $129.00
    BUY EBOOK
  • Understanding Intrusion Detection through Visualization - Stefan Axelsson
    Understanding Intrusion Detection through Visualization
    Stefan Axelsson and David Sands
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Secure Data Management in Decentralized Systems - Ting Yu
    Secure Data Management in Decentralized Systems
    Ting Yu and ?Sushil Jajodia
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Access Control Systems : Security, Identity Management and Trust Models - Messaoud Benantar
    Access Control Systems
    Security, Identity Management and Trust Models
    Messaoud Benantar
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Biometric User Authentication for IT Security : From Fundamentals to Handwriting - Claus Vielhauer
    Biometric User Authentication for IT Security
    From Fundamentals to Handwriting
    Claus Vielhauer
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Hop Integrity in the Internet - Chin-Tser Huang
    Hop Integrity in the Internet
    Chin-Tser Huang and Mohamed G. Gouda
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Practical Internet Security - John R. Vacca
    Practical Internet Security
    John R. Vacca
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Intelligence and Security Informatics for International Security : Information Sharing and Data Mining - Hsinchun Chen
    Intelligence and Security Informatics for International Security
    Information Sharing and Data Mining
    Hsinchun Chen
    eText
    Instant Online Reading*
    $249.00
    BUY EBOOK
  • Wireless Network Security - Yang Xiao
    Wireless Network Security
    Yang Xiao
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Quality Of Protection : Security Measurements and Metrics - Dieter Gollmann
    Quality Of Protection
    Security Measurements and Metrics
    Dieter Gollmann, Fabio Massacci and Artsiom Yautsiukhin
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Power Analysis Attacks : Revealing the Secrets of Smart Cards - Stefan Mangard
    Power Analysis Attacks
    Revealing the Secrets of Smart Cards
    Stefan Mangard, Elisabeth Oswald and Thomas Popp
    eText
    Instant Online Reading*
    $289.00
    BUY EBOOK
  • Malware Detection - Mihai Christodorescu
    Malware Detection
    Mihai Christodorescu, ?Somesh Jha and ?Douglas Maughan
    eText
    Instant Online Reading*
    $479.01
    BUY EBOOK
  • Electronic Postage Systems : Technology, Security, Economics - Gerrit Bleumer
    Electronic Postage Systems
    Technology, Security, Economics
    Gerrit Bleumer
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Security for Wireless Sensor Networks - Donggang Liu
    Security for Wireless Sensor Networks
    Donggang Liu and Peng Ning
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Data Warehousing and Data Mining Techniques for Cyber Security - Anoop Singhal
    Data Warehousing and Data Mining Techniques for Cyber Security
    Anoop Singhal
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Network Security Policies and Procedures - Douglas W. Frye
    Network Security Policies and Procedures
    Douglas W. Frye
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Handbook of Database Security : Applications and Trends - Michael Gertz
    Handbook of Database Security
    Applications and Trends
    Michael Gertz and Sushil Jajodia
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Cryptanalytic Attacks on RSA - Song Y. Yan
    Cryptanalytic Attacks on RSA
    Song Y. Yan
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Privacy-Respecting Intrusion Detection - Ulrich Flegel
    Privacy-Respecting Intrusion Detection
    Ulrich Flegel
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Synchronizing Internet Protocol Security (SIPSec) - Charles A. Shoniregun
    Synchronizing Internet Protocol Security (SIPSec)
    Charles A. Shoniregun
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Botnet Detection : Countering the Largest Security Threat - Wenke Lee
    Botnet Detection
    Countering the Largest Security Threat
    Wenke Lee, Cliff Wang and David Dagon
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
8784 Results | View 24 / 100
< 1 ... 5 6 7 8 9 ... 88 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW