Hello! Enter your postcode for delivery time
Track My Order
Help Centre
+61 2 88805247
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
  • FICTION

      Browse Fiction

    • New Releases
    • Coming Soon
    • Bestselling
      • Popular Subjects

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Children's Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Popular Authors

      • Danielle Steel
      • E L James
      • James Patterson
      • Kerry Greenwood
      • Lee Child
      • Michael Connelly
      • Peter Corris
      • Popular Series

      • Text Classics
    Explore All Fiction >
  • NON-FICTION

      Browse Non-Fiction

    • Bestselling
      • Subjects

      • Accounting & Finance
      • Animals & Nature
      • Antiques & Collectables
      • Archaeology
      • Arts & Entertainment
      • Biographies & True Stories
      • Business & Management
      • Children's Non-Fiction
      • Comedy & Humour
      • Computing & I.T.
      • Cooking, Food & Drink
      • Crafts & Handiwork
      • Dictionaries
      • Earth Sciences & Environment
      • Economics
      • Education
      •  

      • Engineering & Technology
      • Family & Health
      • Gardening
      • History
      • Hobbies, Games & Puzzles
      • Home & House Maintenance
      • Industry & Industrial Studies
      • Language & Linguistics
      • Law
      • Library & Info Sciences
      • Lifestyle & Fashion
      • Literature, Poetry & Plays
      • Mathematics
      • Medicine
      • Mind, Body, Spirit
      • Philosophy
      •  

      • Politics & Government
      • Psychology
      • Reference & Encyclopaedias
      • Religion & Beliefs
      • Science
      • Self-Help & Personal Development
      • Social Services & Welfare
      • Society & Culture
      • Sociology & Anthropology
      • Sports & Recreation
      • Teaching English (ELT)
      • Transportation
      • Travel & Holidays
      • Travel Maps & Atlases
      • Warfare & Defence
    Explore All Non-Fiction >
  • TEXTBOOKS
  • KIDS & YA

      Browse Kids & YA

    • New Releases
    • Bestselling
      • Popular Subjects

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
    Explore All Kids & YA
  • EREADERS
  • KOBO PLUS
eBooks > Non-Fiction > Computing & I.T. > Computer Security
Get Free Shipping on orders over $79

Computer Security

REFINE YOUR RESULTS

SUBJECTS

  • Computer Viruses
  • Data Encryption

LISTS

  • All eBooks (9131)
  • Australian Authors Books (1)
  • Books (9278)
  • Audiobooks (499)
  • eTextbooks (6706)

PRICE

CUSTOMER RATING

  •  
    (22) 
  •  
    & Up (34) 
  •  
    & Up (37) 

LANGUAGE

  • eBook
    (9131)
  • Books
    (9278)
  • Audiobooks
    (499)
  • Audio CDs
    (2)
  • Stationery
    (1)
9278 Results | View 24 / 100
< 1 ... 91 92 93
Sort By
Sort By:
  • Understanding Cryptography : From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms - Christof Paar
    Understanding Cryptography
    From Established Symmetric and Asymmetric Ciphe...
    Christof Paar, Jan Pelzl and Tim Güneysu
    Hardcover
    Available for Backorder
    $223.99
    BACKORDER
  • Computer Security and Cryptography - Nessa O'Brein
    Computer Security and Cryptography
    Nessa O'Brein
    Hardcover
    $344.99
    BUY NOW
  • Crypto FSM Recursion - Punam Raj
    Crypto FSM Recursion
    Punam Raj
    Paperback
    $54.75
    BUY NOW
  • Digital Sovereignty : Protecting Your Crypto Assets Against Common Threats - Josh McIntyre
    Digital Sovereignty
    Protecting Your Crypto Assets Against Common Th...
    Josh McIntyre
    Paperback
    RRP $34.09
    $33.75
    BUY NOW
  • The Rise of the Computer State : The Threat to Our Freedoms, Our Ethics and our Democratic Process - David Burnham
    The Rise of the Computer State
    The Threat to Our Freedoms, Our Ethics and our ...
    David Burnham
    Paperback
    $20.89
    BUY NOW
  • SSH Mastery : OpenSSH, PuTTY, Tunnels and Keys - Michael W Lucas
    SSH Mastery
    OpenSSH, PuTTY, Tunnels and Keys
    Michael W Lucas
    Hardcover
    RRP $65.99
    $59.75
    BUY NOW
  • Hacking - Walter Spivak
    Hacking
    Walter Spivak
    Hardcover
    $52.81
    BUY NOW
  • Bestseller Bargains
  • Computer Security for ASSIST - Martin H. Beach
    Computer Security for ASSIST
    Martin H. Beach
    Hardcover
    $43.95
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Hardcover
    $43.95
    BUY NOW
  • Cybermad - David A. Gale
    Cybermad
    David A. Gale
    Paperback
    $29.65
    BUY NOW
  • Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack - Air Force Institute of Technology
    Leveraging Traditional Battle Damage Assessment Procedures to Measure Eects From A Computer Network Attack
    Richard A. Martino and Air Force Institute of Technology
    Paperback
    $30.75
    BUY NOW
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Hardcover
    $43.95
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Hardcover
    $45.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Hardcover
    $49.45
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Hardcover
    $45.05
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Hardcover
    $42.85
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Hardcover
    $43.95
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Hardcover
    $45.05
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Hardcover
    $48.35
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Hardcover
    $42.85
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Hardcover
    $49.45
    BUY NOW
  • Accelerating Malware Detection via a Graphics Processing Unit - Air Force Institute of Technology (U....
    Accelerating Malware Detection via a Graphics Processing Unit
    Nicholas S. Kovach and Air Force Institute of Technology (U....
    Paperback
    $30.75
    BUY NOW
  • Metamorphic Program Fragmentation as a Software Protection - Air Force Institute of Technology (U....
    Metamorphic Program Fragmentation as a Software Protection
    Bobby Birrer and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System - Air Force Institute of Technology (U....
    Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
    William T. Bai and Air Force Institute of Technology (U....
    Paperback
    $34.05
    BUY NOW
  • A Distributed Agent Architecture for a Computer Virus Immune System - Air Force Institute of Technology (U....
    A Distributed Agent Architecture for a Computer Virus Immune System
    Paul K. Harmer and Air Force Institute of Technology (U....
    Paperback
    $36.25
    BUY NOW
  • Passwords - Kurt W. Martinson
    Passwords
    Kurt W. Martinson
    Paperback
    $30.75
    BUY NOW
  • Digital Warfare - Lawrence G. Downs
    Digital Warfare
    Lawrence G. Downs
    Paperback
    $29.65
    BUY NOW
  • Metamorphism as a Software Protection for Non-Malicious Code - Thomas E. Dube
    Metamorphism as a Software Protection for Non-Malicious Code
    Thomas E. Dube
    Paperback
    $34.05
    BUY NOW
  • Cyber Capabilities for Global Strike in 2035 - Dean A. Clothier
    Cyber Capabilities for Global Strike in 2035
    Dean A. Clothier
    Paperback
    $29.65
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Hardcover
    $43.95
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Hardcover
    $45.05
    BUY NOW
  • Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository - Phillip W. Polk
    Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
    Phillip W. Polk
    Paperback
    $35.15
    BUY NOW
  • Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions - John L. Bebo
    Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
    John L. Bebo
    Paperback
    $34.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Hardcover
    $43.95
    BUY NOW
  • Simple Public Key Infrastructure Analysis Protocol Analysis and Design - Alexander G. Vidergar
    Simple Public Key Infrastructure Analysis Protocol Analysis and Design
    Alexander G. Vidergar
    Hardcover
    $43.95
    BUY NOW
  • A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator - Justin Myers
    A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator
    Justin Myers
    Paperback
    $36.25
    BUY NOW
  • Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function - Jeffrey L. Falkinburg
    Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
    Jeffrey L. Falkinburg
    Hardcover
    $45.05
    BUY NOW
  • Formal Mitigation Strategies for the Insider Threat - Jonathan W. Butts
    Formal Mitigation Strategies for the Insider Threat
    Jonathan W. Butts
    Paperback
    $30.75
    BUY NOW
  • Course Curriculum Development for the Future Cyberwarrior - Mark A. Chacon
    Course Curriculum Development for the Future Cyberwarrior
    Mark A. Chacon
    Hardcover
    $42.85
    BUY NOW
  • A Study to Determine Damage Assessment Methods or Models on Air Force Networks - Lisa S. Thiem
    A Study to Determine Damage Assessment Methods or Models on Air Force Networks
    Lisa S. Thiem
    Paperback
    $30.75
    BUY NOW
  • Software Obfuscation With Symmetric Cryptography - Alan C. Lin
    Software Obfuscation With Symmetric Cryptography
    Alan C. Lin
    Paperback
    $34.05
    BUY NOW
  • Android Protection System - Jonathan D. Stueckle
    Android Protection System
    Jonathan D. Stueckle
    Hardcover
    $43.95
    BUY NOW
  • Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection - Matthew A. Zimmerman
    Mitigating Reversing Vulnerabilities in .NET Applications Using Virtualized Software Protection
    Matthew A. Zimmerman
    Hardcover
    $43.95
    BUY NOW
  • An Analysis of Biometric Technology as an Enabler to Information Assurance - Darren A. Deschaine
    An Analysis of Biometric Technology as an Enabler to Information Assurance
    Darren A. Deschaine
    Paperback
    $30.75
    BUY NOW
  • Active Computer Network Defense - Eric J. Holdaway
    Active Computer Network Defense
    Eric J. Holdaway
    Hardcover
    $42.85
    BUY NOW
  • Enemy at the Gateways - Nathan B. Paddock
    Enemy at the Gateways
    Nathan B. Paddock
    Hardcover
    $42.85
    BUY NOW
  • Psychological Operations Within the Cyberspace Domain - Prentiss O. Baker
    Psychological Operations Within the Cyberspace Domain
    Prentiss O. Baker
    Hardcover
    $42.85
    BUY NOW
  • Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation - Michael J. Myers
    Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation
    Michael J. Myers
    Paperback
    $30.75
    BUY NOW
  • Development of an Malicious Insider Composite Vulnerability Assessment Methodology - William H. King
    Development of an Malicious Insider Composite Vulnerability Assessment Methodology
    William H. King
    Paperback
    $34.05
    BUY NOW
  • To Click or Not to Click - Richard Janoso
    To Click or Not to Click
    Richard Janoso
    Hardcover
    $42.85
    BUY NOW
  • U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States - Brian G. Hermann
    U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
    Brian G. Hermann
    Paperback
    $29.65
    BUY NOW
  • An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS - Danny R. Bias
    An Analysis of the Performance and Security of J2SDK 1.4 JSSE Implementation of SSL/TLS
    Danny R. Bias
    Paperback
    $30.75
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Hardcover
    $45.05
    BUY NOW
  • Cybersecurity Essentials for Small Businesses : Protect Your Business from Breaches, Ransomware, and Compliance Failures - Eric LeBouthillier
    Cybersecurity Essentials for Small Businesses
    Protect Your Business from Breaches, Ransomware...
    Eric LeBouthillier
    Paperback
    RRP $32.99
    $32.75
    BUY NOW
  • An Essay On The Art Of Decyphering - John Davys
    An Essay On The Art Of Decyphering
    John Davys and John Wallis
    Paperback
    $30.75
    BUY NOW
  • Maritime Cybersecurity : Signals and Communication Technology - Sanja Bauk
    Maritime Cybersecurity
    Signals and Communication Technology
    Sanja Bauk
    Hardcover
    $80.70
    BUY NOW
  • Six Sigma for Continuous Improvement in Cybersecurity : A Guide for Students and Professionals - Emre Tokgoz
    Six Sigma for Continuous Improvement in Cybersecurity
    A Guide for Students and Professionals
    Emre Tokgoz
    Hardcover
    $64.99
    BUY NOW
  • THE OTHER SIDE OF THE FIREWALL : The Real-Life Stories of Movers, Shakers, & Glass Ceiling Breakers in Cybersecurity - Ryan J Williams Sr.
    THE OTHER SIDE OF THE FIREWALL
    The Real-Life Stories of Movers, Shakers, & Gla...
    Ryan J Williams Sr.
    Paperback
    $42.89
    BUY NOW
  • Cyber Threat Hunters Handbook : Applying advanced analytics, automation, and collaborative intelligence for digital defense - David F. Pereira Quiceno
    Cyber Threat Hunters Handbook
    Applying advanced analytics, automation, and co...
    David F. Pereira Quiceno
    Paperback
    $67.09
    BUY NOW
  • Computer Vision and Image Processing : 9th International Conference, CVIP 2024, Chennai, India, December 19¢
    Computer Vision and Image Processing
    9th International Conference, CVIP 2024, Chenna...
    Deep Gupta, Subrahmanyam Murala, Santosh Kumar Vipparthi, R. Balasubramanian and Jagadeesh Kakarla
    Paperback
    $249.00
    BUY NOW
  • AI vs. Humanity - The Battle for Human Relevance : How We Can Survive and Thrive in the Age of AI - Christopher Uchenwa
    AI vs. Humanity - The Battle for Human Relevance
    How We Can Survive and Thrive in the Age of AI
    Christopher Uchenwa
    Paperback
    $55.99
    BUY NOW
  • AI vs. Humanity - The Battle for Human Relevance : How We Can Survive and Thrive in the Age of AI - Christopher Uchenwa
    AI vs. Humanity - The Battle for Human Relevance
    How We Can Survive and Thrive in the Age of AI
    Christopher Uchenwa
    Hardcover
    $71.99
    BUY NOW
  • Quantum Unmanned Aerial Vehicle : Achieving Cybersecurity and AI Strategies - Hemant Kumar Saini
    Quantum Unmanned Aerial Vehicle
    Achieving Cybersecurity and AI Strategies
    Hemant Kumar Saini, T. Ananth Kumar, Sardar M.N. Islam and S.B. Goyal
    Hardcover
    $128.67
    BUY NOW
  • Practical Cloud Security Handbook : Secure cloud deployments with AWS, Azure, GCP, and IBM Cloud - Shiv Kumar
    Practical Cloud Security Handbook
    Secure cloud deployments with AWS, Azure, GCP, ...
    Shiv Kumar
    Paperback
    $68.19
    BUY NOW
  • Security Intelligence in the Age of AI : Navigating Legal and Ethical Frameworks - Annita Larissa  Sciacovelli
    Security Intelligence in the Age of AI
    Navigating Legal and Ethical Frameworks
    Annita Larissa Sciacovelli, Pushan Kumar Dutta, Christian Kaunert and Bhupinder Singh
    Hardcover
    $274.75
    BUY NOW
  • Public Key Infrastructure - United States Government Accountabili...
    Public Key Infrastructure
    United States Government Accountabili...
    Hardcover
    $42.85
    BUY NOW
  • MY PERSONAL COMPUTER DATABASE - Sandra Nelson
    MY PERSONAL COMPUTER DATABASE
    Sandra Nelson
    Paperback
    $23.05
    BUY NOW
  • Practical Linux Security Cookbook - Tajinder Kalsi
    Practical Linux Security Cookbook
    Tajinder Kalsi
    Paperback
    $71.49
    BUY NOW
  • Secret Colors - Martin Kleppmann
    Secret Colors
    Martin Kleppmann and Mitch Seymour
    Hardcover
    $28.59
    BUY NOW
  • Cyber Security of Industrial Control Systems in the Future Internet Environment - Mirjana D. StojanoviÄ?
    Cyber Security of Industrial Control Systems in the Future Internet Environment
    Mirjana D. StojanoviÄ? and Slavica V. BoÅ¡tjančič Rakas
    Paperback
    $277.70
    BUY NOW
  • Cybersecurity For Beginners : Unlock the mystery - Ayhma Awther
    Cybersecurity For Beginners
    Unlock the mystery
    Ayhma Awther
    Hardcover
    RRP $37.39
    $35.75
    BUY NOW
  • WLFI - We've Lost Financial Independence - Langdon Cage
    WLFI - We've Lost Financial Independence
    Langdon Cage
    Paperback
    RRP $21.99
    $21.75
    BUY NOW
  • The Voynich Manuscript : The Cipher and The Compendium - Jessica Lorraine Scott (Dunn)
    The Voynich Manuscript
    The Cipher and The Compendium
    Jessica Lorraine Scott (Dunn)
    Hardcover
    RRP $137.49
    $116.75
    15%
    OFF
    BUY NOW
  • Intelligent Video Analytics : Surveillance, Safety, and Operational Efficiency - Adhiguna Mahendra
    Intelligent Video Analytics
    Surveillance, Safety, and Operational Efficiency
    Adhiguna Mahendra and Hasbi Wisudawan
    Paperback
    $86.99
    BUY NOW
  • IoT Armageddon : Securing the Internet of Everything Against Invisible Attacks - Adedayo Jigida
    IoT Armageddon
    Securing the Internet of Everything Against Inv...
    Adedayo Jigida
    Hardcover
    $27.49
    BUY NOW
  • Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function - Jeffrey L. Falkinburg
    Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit's Function
    Jeffrey L. Falkinburg
    Paperback
    $34.05
    BUY NOW
  • Mission Assurance - Brian L. Hale
    Mission Assurance
    Brian L. Hale
    Hardcover
    $48.35
    BUY NOW
  • Software Protection Against Reverse Engineering Tools - Joshua A. Benson
    Software Protection Against Reverse Engineering Tools
    Joshua A. Benson
    Hardcover
    $48.35
    BUY NOW
  • Course Curriculum Development for the Future Cyberwarrior - Mark A. Chacon
    Course Curriculum Development for the Future Cyberwarrior
    Mark A. Chacon
    Paperback
    $29.65
    BUY NOW
  • Patching the Wetware - Alexander D. Nelson
    Patching the Wetware
    Alexander D. Nelson
    Hardcover
    $43.95
    BUY NOW
  • Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework - Larissa A. O'Brien
    Using Sequence Analysis to Perform Application-Based Anomaly Detection Within an Artificial Immune System Framework
    Larissa A. O'Brien
    Paperback
    $30.75
    BUY NOW
  • USCYBERCOM - Robert T. Bridges
    USCYBERCOM
    Robert T. Bridges
    Hardcover
    $42.85
    BUY NOW
  • Offensive Cyber Capability - Stephen M. Marshall
    Offensive Cyber Capability
    Stephen M. Marshall
    Hardcover
    $43.95
    BUY NOW
  • Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis - Lauren M. Wagoner
    Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections With Timing Analysis
    Lauren M. Wagoner
    Paperback
    $34.05
    BUY NOW
  • Establishing the Human Firewall - Jamison W. Scheeres
    Establishing the Human Firewall
    Jamison W. Scheeres
    Hardcover
    $42.85
    BUY NOW
  • Spear Phishing Attack Detection - David T. Merritt
    Spear Phishing Attack Detection
    David T. Merritt
    Hardcover
    $45.05
    BUY NOW
  • Multi-Class Classification for Identifying JPEG Steganography Embedding Methods - Benjamin M. Rodriguez
    Multi-Class Classification for Identifying JPEG Steganography Embedding Methods
    Benjamin M. Rodriguez
    Hardcover
    $48.35
    BUY NOW
  • Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems - Brendan K. Casey
    Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
    Brendan K. Casey
    Paperback
    $29.65
    BUY NOW
  • An Analysis of Botnet Vulnerabilities - Sean W. Hudson
    An Analysis of Botnet Vulnerabilities
    Sean W. Hudson
    Paperback
    $30.75
    BUY NOW
  • Suspicion Modeling in Support of Cyber-Influence Operations/Tactics - Henry G. Paguirigan
    Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
    Henry G. Paguirigan
    Paperback
    $34.05
    BUY NOW
  • Toward Cyber Omniscience - William P. Jensen
    Toward Cyber Omniscience
    William P. Jensen
    Paperback
    $29.65
    BUY NOW
  • Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems - Matthew J. Mcalister
    Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems
    Matthew J. Mcalister
    Hardcover
    $45.05
    BUY NOW
  • Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks - Kevin M. Finnigin
    Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks
    Kevin M. Finnigin
    Hardcover
    $45.05
    BUY NOW
  • U.S. Cyber Strategy Deterrence and Strategic Response - Brian G. Hermann
    U.S. Cyber Strategy Deterrence and Strategic Response
    Brian G. Hermann
    Hardcover
    $42.85
    BUY NOW
  • Interagency Organization for Cyberwar - Donovan L. Routsis
    Interagency Organization for Cyberwar
    Donovan L. Routsis
    Paperback
    $29.65
    BUY NOW
  • Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling - Ryan T. Ostler
    Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling
    Ryan T. Ostler
    Paperback
    $35.15
    BUY NOW
  • An Application of Automated Theorem Provers to Computer System Security - Mitchell David Irwin Hirschfeld
    An Application of Automated Theorem Provers to Computer System Security
    Mitchell David Irwin Hirschfeld
    Paperback
    $34.05
    BUY NOW
  • Defining Our National Cyberspace Boundaries - United States Army: U.S. Army War Col...
    Defining Our National Cyberspace Boundaries
    Jeffery R. Schilling and United States Army: U.S. Army War Col...
    Paperback
    $29.65
    BUY NOW
9278 Results | View 24 / 100
< 1 ... 91 92 93
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW