Hello! Enter your postcode for delivery time
Track My Order
Help Centre
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
  • FICTION

      Browse Fiction

    • New Releases
    • Coming Soon
    • Bestselling
      • Popular Subjects

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Children's Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Popular Authors

      • Danielle Steel
      • E L James
      • James Patterson
      • Kerry Greenwood
      • Lee Child
      • Michael Connelly
      • Peter Corris
      • Popular Series

      • Text Classics
    Explore All Fiction >
  • NON-FICTION

      Browse Non-Fiction

    • Bestselling
      • Subjects

      • Accounting & Finance
      • Animals & Nature
      • Antiques & Collectables
      • Archaeology
      • Arts & Entertainment
      • Biographies & True Stories
      • Business & Management
      • Children's Non-Fiction
      • Comedy & Humour
      • Computing & I.T.
      • Cooking, Food & Drink
      • Crafts & Handiwork
      • Dictionaries
      • Earth Sciences & Environment
      • Economics
      • Education
      •  

      • Engineering & Technology
      • Family & Health
      • Gardening
      • History
      • Hobbies, Games & Puzzles
      • Home & House Maintenance
      • Industry & Industrial Studies
      • Language & Linguistics
      • Law
      • Library & Info Sciences
      • Lifestyle & Fashion
      • Literature, Poetry & Plays
      • Mathematics
      • Medicine
      • Mind, Body, Spirit
      • Philosophy
      •  

      • Politics & Government
      • Psychology
      • Reference & Encyclopaedias
      • Religion & Beliefs
      • Science
      • Self-Help & Personal Development
      • Social Services & Welfare
      • Society & Culture
      • Sociology & Anthropology
      • Sports & Recreation
      • Teaching English (ELT)
      • Transportation
      • Travel & Holidays
      • Travel Maps & Atlases
      • Warfare & Defence
    Explore All Non-Fiction >
  • TEXTBOOKS
  • KIDS & YA

      Browse Kids & YA

    • New Releases
    • Bestselling
      • Popular Subjects

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
    Explore All Kids & YA
  • EREADERS
  • KOBO PLUS
eBooks > Non-Fiction > Computing & I.T. > Computer Security
Get Free Shipping on orders over $89

Computer Security

REFINE YOUR RESULTS

SUBJECTS

  • Computer Viruses
  • Data Encryption

LISTS

  • All eBooks (8985)
  • Australian Authors Books (1)
  • Books (10165)
  • Audiobooks (522)
  • eTextbooks (6923)

AVAILABILITY

  • All eBooks (8985)
  • New Releases (267)
  • Coming Soon (43)
  • Subscription eBooks (1503)

PRICE

CUSTOMER RATING

  •  
    (2) 
  •  
    & Up (4) 
  •  
    & Up (4) 

FORMATS

LANGUAGE

  • eBook
    (8985)
  • Books
    (10165)
  • Audiobooks
    (522)
  • Audio CDs
    (1)
  • Stationery
    (3)
8985 Results | View 24 / 100
< 1 ... 87 88 89 90 >
Sort By
Sort By:
  • Introduction to Cryptography - Sahadeo Padhye
    Introduction to Cryptography
    Sahadeo Padhye, Rajeev A. Sahu and Vishal Saraswat
    eText
    Instant Online Reading*
    $107.79
    BUY EBOOK
  • Routledge Handbook of Terrorism and Counterterrorism - Andrew Silke
    Routledge Handbook of Terrorism and Counterterrorism
    Andrew Silke
    eText
    Instant Online Reading*
    $104.49
    BUY EBOOK
  • Digital Privacy, Terrorism and Law Enforcement : The UK's Response to Terrorist Communication - Simon Hale-Ross
    Digital Privacy, Terrorism and Law Enforcement
    The UK's Response to Terrorist Communication
    Simon Hale-Ross
    eText
    Instant Online Reading*
    $94.59
    BUY EBOOK
  • The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications : The Intelligent Cyber Shield for Smart Cities - Rocky Termanini
    The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications
    The Intelligent Cyber Shield for Smart Cities
    Rocky Termanini
    eText
    Instant Online Reading*
    $100.09
    BUY EBOOK
  • Cryptoeconomics : Economic Mechanisms Behind Blockchains - Jing Li
    Cryptoeconomics
    Economic Mechanisms Behind Blockchains
    Jing Li, Dusit Niyato and Zhu Han
    eBook
    Instant Digital Delivery
    RRP $209.95
    $178.52
    15%
    OFF
    BUY EBOOK
  • Regulating Access and Transfer of Data : Global Competition Law and Economics Policy - Björn Lundqvist
    Regulating Access and Transfer of Data
    Global Competition Law and Economics Policy
    Björn Lundqvist
    eBook
    Instant Digital Delivery
    RRP $197.95
    $168.29
    15%
    OFF
    BUY EBOOK
  • Digital Constitutionalism in Europe : Reframing Rights and Powers in the Algorithmic Society - Giovanni De Gregorio
    Digital Constitutionalism in Europe
    Reframing Rights and Powers in the Algorithmic ...
    Giovanni De Gregorio
    eBook
    Instant Digital Delivery
    RRP $64.82
    $55.10
    15%
    OFF
    BUY EBOOK
  • Bestseller Bargains
  • Cryptography Algorithms : A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption - Massimo Bertaccini
    Cryptography Algorithms
    A guide to algorithms in blockchain, quantum cr...
    Massimo Bertaccini
    eText
    Instant Online Reading*
    $59.39
    My Library BUY EBOOK
  • Privacy's Blueprint : The Battle to Control the Design of New Technologies - Woodrow Hartzog
    Privacy's Blueprint
    The Battle to Control the Design of New Technol...
    Woodrow Hartzog
    eBook
    Instant Digital Delivery
    RRP $61.74
    $52.57
    15%
    OFF
    BUY EBOOK
  • Cloud Computing : The MIT Press Essential Knowledge series - Nayan B. Ruparelia
    Cloud Computing
    The MIT Press Essential Knowledge series
    Nayan B. Ruparelia
    eText
    Instant Online Reading*
    $21.24
    BUY EBOOK
  • Metasploit : The Penetration Tester's Guide - David Kennedy
    Metasploit
    The Penetration Tester's Guide
    David Kennedy, Jim O'Gorman, Devon Kearns and Mati Aharoni
    eText
    Instant Online Reading*
    $45.52
    BUY EBOOK
  • Microsoft Information Protection Administrator SC-400 Certification Guide : Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence - Shabaz Darr
    Microsoft Information Protection Administrator SC-400 Certification Guide
    Advance your Microsoft Security & Compliance se...
    Shabaz Darr
    eText
    Instant Online Reading*
    $62.69
    My Library BUY EBOOK
  • Agile Security Operations : Engineering for agility in cyber defense, detection, and response - Hinne Hettema
    Agile Security Operations
    Engineering for agility in cyber defense, detec...
    Hinne Hettema
    eText
    Instant Online Reading*
    $56.09
    My Library BUY EBOOK
  • The Cybersecurity Playbook for Modern Enterprises : An end-to-end guide to preventing data breaches and cyber attacks - Jeremy Wittkop
    The Cybersecurity Playbook for Modern Enterprises
    An end-to-end guide to preventing data breaches...
    Jeremy Wittkop
    eText
    Instant Online Reading*
    $56.09
    My Library BUY EBOOK
  • Mastering Defensive Security : Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure - Cesar Bravo
    Mastering Defensive Security
    Effective techniques to secure your Windows, Li...
    Cesar Bravo
    eText
    Instant Online Reading*
    $70.39
    My Library BUY EBOOK
  • Microsoft Identity and Access Administrator Exam Guide : Implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-300 exam - Dwayne Natwick
    Microsoft Identity and Access Administrator Exam Guide
    Implement IAM solutions with Azure AD, build an...
    Dwayne Natwick
    eText
    Instant Online Reading*
    $62.69
    My Library BUY EBOOK
  • CompTIA CASP+ CAS-004 Certification Guide : Develop CASP  skills and learn all the key topics needed to prepare for the certification exam - Mark Birch
    CompTIA CASP+ CAS-004 Certification Guide
    Develop CASP skills and learn all the key topi...
    Mark Birch
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Microsoft Sentinel in Action : Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions, 2nd Edition - Richard Diver
    Microsoft Sentinel in Action
    Architect, design, implement, and operate Micro...
    Richard Diver
    eText
    Instant Online Reading*
    $62.69
    My Library BUY EBOOK
  • Network Protocols for Security Professionals : Probe and identify network-based vulnerabilities and safeguard against network protocol breaches - Yoram Orzach
    Network Protocols for Security Professionals
    Probe and identify network-based vulnerabilitie...
    Yoram Orzach
    eText
    Instant Online Reading*
    $67.09
    My Library BUY EBOOK
  • Incident Response with Threat Intelligence : Practical insights into developing an incident response capability through intelligence-based threat hunting - Roberto Martinez
    Incident Response with Threat Intelligence
    Practical insights into developing an incident ...
    Roberto Martinez
    eText
    Instant Online Reading*
    $59.39
    My Library BUY EBOOK
  • Cybersecurity Leadership Demystified : A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO - Dr. Erdal Ozkaya
    Cybersecurity Leadership Demystified
    A comprehensive guide to becoming a world-class...
    Dr. Erdal Ozkaya
    eText
    Instant Online Reading*
    $70.39
    My Library BUY EBOOK
  • Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide : Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems - Trevor Stuart
    Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
    Manage, monitor, and respond to threats using M...
    Trevor Stuart
    eText
    Instant Online Reading*
    $56.09
    My Library BUY EBOOK
  • Practical Memory Forensics : Jumpstart effective forensic analysis of volatile memory - Svetlana Ostrovskaya
    Practical Memory Forensics
    Jumpstart effective forensic analysis of volati...
    Svetlana Ostrovskaya
    eText
    Instant Online Reading*
    $56.09
    My Library BUY EBOOK
  • Building a Cyber Resilient Business : A cyber handbook for executives and boards - Dr. Magda Lilia Chelly
    Building a Cyber Resilient Business
    A cyber handbook for executives and boards
    Dr. Magda Lilia Chelly
    eText
    Instant Online Reading*
    $70.39
    My Library BUY EBOOK
  • Offensive Shellcode from Scratch : Get to grips with shellcode countermeasures and discover how to bypass them - Rishalin Pillay
    Offensive Shellcode from Scratch
    Get to grips with shellcode countermeasures and...
    Rishalin Pillay
    eText
    Instant Online Reading*
    $56.09
    My Library BUY EBOOK
  • Incident Response Techniques for Ransomware Attacks : Understand modern ransomware attacks and build an incident response strategy to work through them - Oleg Skulkin
    Incident Response Techniques for Ransomware Attacks
    Understand modern ransomware attacks and build ...
    Oleg Skulkin
    eText
    Instant Online Reading*
    $62.69
    My Library BUY EBOOK
  • Hack the Cybersecurity Interview : A complete interview preparation guide for jumpstarting your cybersecurity career - Ken Underhill
    Hack the Cybersecurity Interview
    A complete interview preparation guide for jump...
    Ken Underhill
    eText
     
    (3 reviews)
    Instant Online Reading*
    $89.09
    My Library BUY EBOOK
  • iOS Forensics for Investigators : Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence - Gianluca Tiepolo
    iOS Forensics for Investigators
    Take mobile forensics to the next level by anal...
    Gianluca Tiepolo
    eText
    Instant Online Reading*
    $59.39
    My Library BUY EBOOK
  • Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 : Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure - Dwayne Natwick
    Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900
    Familiarize yourself with security, identity, a...
    Dwayne Natwick
    eText
    Instant Online Reading*
    $53.89
    My Library BUY EBOOK
  • Accelerating DevSecOps on AWS : Create secure CI/CD pipelines using Chaos and AIOps - Nikit Swaraj
    Accelerating DevSecOps on AWS
    Create secure CI/CD pipelines using Chaos and A...
    Nikit Swaraj
    eText
    Instant Online Reading*
    $67.09
    My Library BUY EBOOK
  • Policy Design in the Age of Digital Adoption : Explore how PolicyOps can drive Policy as Code adoption in an organization's digital transformation - Ricardo Ferreira
    Policy Design in the Age of Digital Adoption
    Explore how PolicyOps can drive Policy as Code ...
    Ricardo Ferreira
    eText
    Instant Online Reading*
    $59.39
    My Library BUY EBOOK
  • Crafting Secure Software : An engineering leader's guide to security by design - Greg Bulmash
    Crafting Secure Software
    An engineering leader's guide to security by de...
    Greg Bulmash
    eText
    Instant Online Reading*
    $73.69
    My Library BUY EBOOK
  • Resilient Cybersecurity : Reconstruct your defense strategy in an evolving cyber world - Mark Dunkerley
    Resilient Cybersecurity
    Reconstruct your defense strategy in an evolvin...
    Mark Dunkerley
    eText
    Instant Online Reading*
    $61.59
    My Library BUY EBOOK
  • Unveiling NIST Cybersecurity Framework 2.0 : Secure your organization with the practical applications of CSF - Jason Brown
    Unveiling NIST Cybersecurity Framework 2.0
    Secure your organization with the practical app...
    Jason Brown
    eText
    Instant Online Reading*
    $54.99
    My Library BUY EBOOK
  • Microsoft 365 Administration Cookbook : Boost efficiency, automate processes, and enforce compliance with expert admin recipes - Nate Chamberlain
    Microsoft 365 Administration Cookbook
    Boost efficiency, automate processes, and enfor...
    Nate Chamberlain
    eText
    Instant Online Reading*
    $54.99
    My Library BUY EBOOK
  • Mastering Microsoft Defender for Office 365 : Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting - Samuel Soto
    Mastering Microsoft Defender for Office 365
    Streamline Office 365 security with expert tips...
    Samuel Soto
    eText
    Instant Online Reading*
    $54.99
    My Library BUY EBOOK
  • AWS Security Cookbook : Practical solutions for securing AWS cloud infrastructure with essential services and best practices - Heartin Kanikathottu
    AWS Security Cookbook
    Practical solutions for securing AWS cloud infr...
    Heartin Kanikathottu
    eText
    Instant Online Reading*
    $54.99
    My Library BUY EBOOK
  • Microsoft Defender for Identity in Depth : An exhaustive guide to ITDR, breach prevention, and cyberattack response - Pierre Thoor
    Microsoft Defender for Identity in Depth
    An exhaustive guide to ITDR, breach prevention,...
    Pierre Thoor
    eText
    Instant Online Reading*
    $54.99
    My Library BUY EBOOK
  • Hack the Cybersecurity Interview : Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles - Christophe Foulon
    Hack the Cybersecurity Interview
    Navigate Cybersecurity Interviews with Confiden...
    Christophe Foulon
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Hands-On Blockchain for Python Developers : Empowering Python developers in the world of blockchain and smart contracts - Arjuna Sky Kok
    Hands-On Blockchain for Python Developers
    Empowering Python developers in the world of bl...
    Arjuna Sky Kok
    eText
    Instant Online Reading*
    $58.29
    My Library BUY EBOOK
  • Threat Modeling Gameplay with EoP : A reference manual for spotting threats in software architecture - Brett Crawley
    Threat Modeling Gameplay with EoP
    A reference manual for spotting threats in soft...
    Brett Crawley
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • The Complete Guide to Defense in Depth : Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach - Akash Mukherjee
    The Complete Guide to Defense in Depth
    Learn to identify, mitigate, and prevent cyber ...
    Akash Mukherjee
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Ghidra Software Reverse-Engineering for Beginners : Master the art of debugging, from understanding code to mitigating threats - David Álvarez Pérez
    Ghidra Software Reverse-Engineering for Beginners
    Master the art of debugging, from understanding...
    David Álvarez Pérez
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Cloud Security Handbook : Effectively secure cloud environments using AWS, Azure, and GCP - Eyal Estrin
    Cloud Security Handbook
    Effectively secure cloud environments using AWS...
    Eyal Estrin
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Enhancing Your Cloud Security with a CNAPP Solution : Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security - Yuri Diogenes
    Enhancing Your Cloud Security with a CNAPP Solution
    Unlock the full potential of Microsoft Defender...
    Yuri Diogenes
    eText
    Instant Online Reading*
    $61.59
    My Library BUY EBOOK
  • Microsoft Cybersecurity Architect Exam Ref SC-100 : Ace the SC-100 exam and develop cutting-edge cybersecurity strategies - Dwayne Natwick
    Microsoft Cybersecurity Architect Exam Ref SC-100
    Ace the SC-100 exam and develop cutting-edge cy...
    Dwayne Natwick
    eText
    Instant Online Reading*
    $61.59
    My Library BUY EBOOK
  • Check Point Firewall Administration R81.10+ : A practical guide to Check Point firewall deployment and administration - Vladimir Yakovlev
    Check Point Firewall Administration R81.10+
    A practical guide to Check Point firewall deplo...
    Vladimir Yakovlev
    eText
    Instant Online Reading*
    $74.79
    My Library BUY EBOOK
  • Windows Server 2022 Administration Fundamentals : A beginner's guide to managing and administering Windows Server environments, 3rd Edition - Bekim Dauti
    Windows Server 2022 Administration Fundamentals
    A beginner's guide to managing and administerin...
    Bekim Dauti
    eText
    Instant Online Reading*
    $102.29
    My Library BUY EBOOK
  • Mastering Malware Analysis : A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition - Alexey Kleymenov
    Mastering Malware Analysis
    A malware analyst's practical guide to combatin...
    Alexey Kleymenov
    eText
    Instant Online Reading*
    $70.39
    My Library BUY EBOOK
  • Cybersecurity Architect's Handbook : An end-to-end guide to implementing and maintaining robust security architecture - Lester Nichols
    Cybersecurity Architect's Handbook
    An end-to-end guide to implementing and maintai...
    Lester Nichols
    eText
    Instant Online Reading*
    $97.89
    My Library BUY EBOOK
  • Cloud Auditing Best Practices : Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans - Shinesa Cambric
    Cloud Auditing Best Practices
    Perform Security and IT Audits across AWS, Azur...
    Shinesa Cambric
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Azure Security Cookbook : Practical recipes for securing Azure resources and operations - Steve Miles
    Azure Security Cookbook
    Practical recipes for securing Azure resources ...
    Steve Miles
    eText
    Instant Online Reading*
    $51.69
    My Library BUY EBOOK
  • Cloud Native Software Security Handbook : Unleash the power of cloud native tools for robust security in modern applications - Mihir Shah
    Cloud Native Software Security Handbook
    Unleash the power of cloud native tools for rob...
    Mihir Shah
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization, 2nd Edition - Tim Rains
    Cybersecurity Threats, Malware Trends, and Strategies
    Discover risk mitigation strategies for modern ...
    Tim Rains
    eText
    Instant Online Reading*
    $85.79
    My Library BUY EBOOK
  • Python for Security and Networking : Leverage Python modules and tools in securing your network and applications, 3rd Edition - José Manuel Ortega
    Python for Security and Networking
    Leverage Python modules and tools in securing y...
    José Manuel Ortega
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Microsoft Defender for Endpoint in Depth : Take any organization's endpoint security to the next level - Paul Huijbregts
    Microsoft Defender for Endpoint in Depth
    Take any organization's endpoint security to th...
    Paul Huijbregts
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program - Jason Brown
    Executive's Cybersecurity Program Handbook
    A comprehensive guide to building and operation...
    Jason Brown
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Keycloak - Identity and Access Management for Modern Applications : Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Stian Thorgersen
    Keycloak - Identity and Access Management for Modern Applications
    Harness the power of Keycloak, OpenID Connect, ...
    Stian Thorgersen
    eText
    Instant Online Reading*
    $70.39
    My Library BUY EBOOK
  • Purple Team Strategies : Enhancing global security posture through uniting red and blue teams with adversary emulation - David Routin
    Purple Team Strategies
    Enhancing global security posture through uniti...
    David Routin
    eText
    Instant Online Reading*
    $53.89
    My Library BUY EBOOK
  • Microsoft Defender for Cloud Cookbook : Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture - Sasha Kranjac
    Microsoft Defender for Cloud Cookbook
    Protect multicloud and hybrid cloud environment...
    Sasha Kranjac
    eText
    Instant Online Reading*
    $59.39
    My Library BUY EBOOK
  • Zed Attack Proxy Cookbook : Hacking tactics, techniques, and procedures for testing web applications and APIs - Ryan Soper
    Zed Attack Proxy Cookbook
    Hacking tactics, techniques, and procedures for...
    Ryan Soper
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Microsoft Cybersecurity Architect Exam Ref SC-100 : Get certified with ease while learning how to develop highly effective cybersecurity strategies - Dwayne Natwick
    Microsoft Cybersecurity Architect Exam Ref SC-100
    Get certified with ease while learning how to d...
    Dwayne Natwick
    eText
    Instant Online Reading*
    $102.29
    My Library BUY EBOOK
  • An Ethical Guide to Cyber Anonymity : Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments - Kushantha Gunawardana
    An Ethical Guide to Cyber Anonymity
    Concepts, tools, and techniques to protect your...
    Kushantha Gunawardana
    eText
    Instant Online Reading*
    $47.29
    My Library BUY EBOOK
  • The Software Developer's Guide to Linux : A practical, no-nonsense guide to using the Linux command line and utilities as a software developer - David Cohen
    The Software Developer's Guide to Linux
    A practical, no-nonsense guide to using the Lin...
    David Cohen
    eText
    Instant Online Reading*
    $51.69
    My Library BUY EBOOK
  • Defending APIs : Uncover advanced defense techniques to craft secure application programming interfaces - Colin Domoney
    Defending APIs
    Uncover advanced defense techniques to craft se...
    Colin Domoney
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • CompTIA Network+ N10-008 Certification Guide - Second Edition : The ultimate guide to passing the N10-008 exam, 2nd Edition - Glen D. Singh
    CompTIA Network+ N10-008 Certification Guide - Second Edition
    The ultimate guide to passing the N10-008 exam,...
    Glen D. Singh
    eText
    Instant Online Reading*
    $75.89
    My Library BUY EBOOK
  • Cybersecurity and Privacy Law Handbook : A beginner's guide to dealing with privacy and security while keeping hackers at bay - Walter Rocchi
    Cybersecurity and Privacy Law Handbook
    A beginner's guide to dealing with privacy and ...
    Walter Rocchi
    eText
    Instant Online Reading*
    $67.09
    My Library BUY EBOOK
  • The Vulnerability Researcher's Handbook : A comprehensive guide to discovering, reporting, and publishing security vulnerabilities - Benjamin Strout
    The Vulnerability Researcher's Handbook
    A comprehensive guide to discovering, reporting...
    Benjamin Strout
    eText
    Instant Online Reading*
    $47.29
    My Library BUY EBOOK
  • Combating Crime on the Dark Web : Learn how to access the dark web safely and not fall victim to cybercrime - Nearchos Nearchou
    Combating Crime on the Dark Web
    Learn how to access the dark web safely and not...
    Nearchos Nearchou
    eText
    Instant Online Reading*
    $45.09
    My Library BUY EBOOK
  • Diving into Secure Access Service Edge : A technical leadership guide to achieving success with SASE at market speed - Jeremiah Ginn
    Diving into Secure Access Service Edge
    A technical leadership guide to achieving succe...
    Jeremiah Ginn
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Machine Learning Security Principles : Keep data, networks, users, and applications safe from prying eyes - John Paul Mueller
    Machine Learning Security Principles
    Keep data, networks, users, and applications sa...
    John Paul Mueller
    eText
    Instant Online Reading*
    $59.39
    My Library BUY EBOOK
  • Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization - Kunal Sehgal
    Cybersecurity Blue Team Strategies
    Uncover the secrets of blue teams to combat cyb...
    Kunal Sehgal
    eText
    Instant Online Reading*
    $45.09
    My Library BUY EBOOK
  • Red Hat Enterprise Linux 9 Administration : A comprehensive Linux system administration guide for RHCSA certification exam candidates, 2nd Edition - Pablo Iranzo Gómez
    Red Hat Enterprise Linux 9 Administration
    A comprehensive Linux system administration gui...
    Pablo Iranzo Gómez
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Windows Ransomware Detection and Protection : Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender - Marius Sandbu
    Windows Ransomware Detection and Protection
    Securing Windows endpoints, the cloud, and infr...
    Marius Sandbu
    eText
    Instant Online Reading*
    $51.69
    My Library BUY EBOOK
  • Active Directory Administration Cookbook, Second Edition : Proven solutions to everyday identity and authentication challenges for both on-premises and the cloud, 2nd Edition - Sander Berkouwer
    Active Directory Administration Cookbook, Second Edition
    Proven solutions to everyday identity and authe...
    Sander Berkouwer
    eText
    Instant Online Reading*
    $67.09
    My Library BUY EBOOK
  • MS-700 Managing Microsoft Teams Exam Guide : Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease, 2nd Edition - Peter Rising
    MS-700 Managing Microsoft Teams Exam Guide
    Configure and manage Microsoft Teams workloads ...
    Peter Rising
    eText
    Instant Online Reading*
    $102.29
    My Library BUY EBOOK
  • OPNsense Beginner to Professional : Protect networks and build next-generation firewalls easily with OPNsense - Julio Cesar Bueno de Camargo
    OPNsense Beginner to Professional
    Protect networks and build next-generation fire...
    Julio Cesar Bueno de Camargo
    eText
    Instant Online Reading*
    $59.39
    My Library BUY EBOOK
  • Cybersecurity - Attack and Defense Strategies : Improve your security posture to mitigate risks and prevent attackers from infiltrating your system, 3rd Edition - Yuri Diogenes
    Cybersecurity - Attack and Defense Strategies
    Improve your security posture to mitigate risks...
    Yuri Diogenes
    eText
    Instant Online Reading*
    $53.89
    My Library BUY EBOOK
  • Cloud Identity Patterns and Strategies : Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory - Giuseppe Di Federico
    Cloud Identity Patterns and Strategies
    Design enterprise cloud identity models with OA...
    Giuseppe Di Federico
    eText
    Instant Online Reading*
    $47.29
    My Library BUY EBOOK
  • The Foundations of Threat Hunting : Organize and design effective cyber threat hunts to meet business needs - Chad Maurice
    The Foundations of Threat Hunting
    Organize and design effective cyber threat hunt...
    Chad Maurice
    eText
    Instant Online Reading*
    $53.89
    My Library BUY EBOOK
  • Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques - Milad Aslaner
    Cybersecurity Strategies and Best Practices
    A comprehensive guide to mastering enterprise c...
    Milad Aslaner
    eText
    Instant Online Reading*
    $61.59
    My Library BUY EBOOK
  • Mastering Cloud Security Posture Management (CSPM) : Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques - Qamar Nomani
    Mastering Cloud Security Posture Management (CSPM)
    Secure multi-cloud infrastructure across AWS, A...
    Qamar Nomani
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • TLS Cryptography In-Depth : Explore the intricacies of modern cryptography and the inner workings of TLS - Dr. Paul Duplys
    TLS Cryptography In-Depth
    Explore the intricacies of modern cryptography ...
    Dr. Paul Duplys
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Offensive Security Using Python : A hands-on guide to offensive tactics and threat mitigation using practical strategies - Rejah Rehim
    Offensive Security Using Python
    A hands-on guide to offensive tactics and threa...
    Rejah Rehim
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • A CISO Guide to Cyber Resilience : A how-to guide for every CISO to build a resilient security program - Debra Baker
    A CISO Guide to Cyber Resilience
    A how-to guide for every CISO to build a resili...
    Debra Baker
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Endpoint Detection and Response Essentials : Explore the landscape of hacking, defense, and deployment in EDR - Guven Boyraz
    Endpoint Detection and Response Essentials
    Explore the landscape of hacking, defense, and ...
    Guven Boyraz
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Bug Bounty from Scratch : A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity - Francisco Javier Santiago Vázquez
    Bug Bounty from Scratch
    A comprehensive guide to discovering vulnerabil...
    Francisco Javier Santiago Vázquez
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Implementing Palo Alto Networks Prisma® Access : Learn real-world network protection - Tom Piens Aka  'Reaper'
    Implementing Palo Alto Networks Prisma® Access
    Learn real-world network protection
    Tom Piens Aka 'Reaper'
    eText
    Instant Online Reading*
    $67.09
    My Library BUY EBOOK
  • Critical Infrastructure Security : Cybersecurity lessons learned from real-world breaches - Soledad Antelada Toledano
    Critical Infrastructure Security
    Cybersecurity lessons learned from real-world b...
    Soledad Antelada Toledano
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Cloud Forensics Demystified : Decoding cloud investigation complexities for digital forensic professionals - Ganesh Ramakrishnan
    Cloud Forensics Demystified
    Decoding cloud investigation complexities for d...
    Ganesh Ramakrishnan
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
  • Spring Security : Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Badr Nasslahsen
    Spring Security
    Effectively secure your web apps, RESTful servi...
    Badr Nasslahsen
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Spring Boot 3.0 Cookbook : Proven recipes for building modern and robust Java web applications with Spring Boot - Felip Miguel Puig
    Spring Boot 3.0 Cookbook
    Proven recipes for building modern and robust J...
    Felip Miguel Puig
    eText
    Instant Online Reading*
    $49.49
    My Library BUY EBOOK
  • Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide : Become an expert and get Google Cloud certified with this practitioner's guide - Ankush Chowdhary
    Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
    Become an expert and get Google Cloud certified...
    Ankush Chowdhary
    eText
    Instant Online Reading*
    $76.99
    My Library BUY EBOOK
  • Learn Ethereum : A practical guide to help developers set up and run decentralized applications with Ethereum 2.0 - Xun (Brian) Wu
    Learn Ethereum
    A practical guide to help developers set up and...
    Xun (Brian) Wu
    eText
    Instant Online Reading*
    $70.39
    My Library BUY EBOOK
  • Burp Suite Cookbook : Web application security made easy with Burp Suite - Dr. Sunny Wear
    Burp Suite Cookbook
    Web application security made easy with Burp Suite
    Dr. Sunny Wear
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Building and Automating Penetration Testing Labs in the Cloud : Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP - Joshua Arvin Lat
    Building and Automating Penetration Testing Labs in the Cloud
    Set up cost-effective hacking environments for ...
    Joshua Arvin Lat
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Practical Cybersecurity Architecture : A guide to creating and implementing robust designs for cybersecurity architects - Diana Kelley
    Practical Cybersecurity Architecture
    A guide to creating and implementing robust des...
    Diana Kelley
    eText
    Instant Online Reading*
    $63.79
    My Library BUY EBOOK
  • Automotive Cybersecurity Engineering Handbook : The automotive engineer's roadmap to cyber-resilient vehicles - Dr. Ahmad MK Nasser
    Automotive Cybersecurity Engineering Handbook
    The automotive engineer's roadmap to cyber-resi...
    Dr. Ahmad MK Nasser
    eText
    Instant Online Reading*
    $70.39
    My Library BUY EBOOK
  • Information Security Handbook : Enhance your proficiency in information security program development - Darren Death
    Information Security Handbook
    Enhance your proficiency in information securit...
    Darren Death
    eText
    Instant Online Reading*
    $57.19
    My Library BUY EBOOK
8985 Results | View 24 / 100
< 1 ... 87 88 89 90 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW