Hello! Enter your postcode for delivery time
Track My Order
Help Centre
+61 2 88805247
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
  • FICTION

      Browse Fiction

    • New Releases
    • Coming Soon
    • Bestselling
      • Popular Subjects

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Children's Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Popular Authors

      • Danielle Steel
      • E L James
      • James Patterson
      • Kerry Greenwood
      • Lee Child
      • Michael Connelly
      • Peter Corris
      • Popular Series

      • Text Classics
    Explore All Fiction >
  • NON-FICTION

      Browse Non-Fiction

    • Bestselling
      • Subjects

      • Accounting & Finance
      • Animals & Nature
      • Antiques & Collectables
      • Archaeology
      • Arts & Entertainment
      • Biographies & True Stories
      • Business & Management
      • Children's Non-Fiction
      • Comedy & Humour
      • Computing & I.T.
      • Cooking, Food & Drink
      • Crafts & Handiwork
      • Dictionaries
      • Earth Sciences & Environment
      • Economics
      • Education
      •  

      • Engineering & Technology
      • Family & Health
      • Gardening
      • History
      • Hobbies, Games & Puzzles
      • Home & House Maintenance
      • Industry & Industrial Studies
      • Language & Linguistics
      • Law
      • Library & Info Sciences
      • Lifestyle & Fashion
      • Literature, Poetry & Plays
      • Mathematics
      • Medicine
      • Mind, Body, Spirit
      • Philosophy
      •  

      • Politics & Government
      • Psychology
      • Reference & Encyclopaedias
      • Religion & Beliefs
      • Science
      • Self-Help & Personal Development
      • Social Services & Welfare
      • Society & Culture
      • Sociology & Anthropology
      • Sports & Recreation
      • Teaching English (ELT)
      • Transportation
      • Travel & Holidays
      • Travel Maps & Atlases
      • Warfare & Defence
    Explore All Non-Fiction >
  • TEXTBOOKS
  • KIDS & YA

      Browse Kids & YA

    • New Releases
    • Bestselling
      • Popular Subjects

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
    Explore All Kids & YA
  • EREADERS
  • KOBO PLUS
eBooks > Non-Fiction > Computing & I.T. > Computer Security > Data Encryption
Get Free Shipping on orders over $79

Data Encryption

REFINE YOUR RESULTS

SUBJECTS

  • Computer Viruses
  • Data Encryption

LISTS

  • All eBooks (8593)
  • Australian Authors Books (1)
  • Books (6993)
  • Audiobooks (395)
  • eTextbooks (6430)

AVAILABILITY

  • All eBooks (8593)
  • New Releases (403)
  • Coming Soon (21)
  • Subscription eBooks (1751)

PRICE

CUSTOMER RATING

  •  
    (1) 
  •  
    & Up (2) 
  •  
    & Up (2) 

FORMATS

LANGUAGE

  • eBook
    (8593)
  • Books
    (6993)
  • Audiobooks
    (395)
  • Audio CDs
    (2)
8593 Results | View 24 / 100
< 1 ... 10 11 12 13 14 ... 86 >
Sort By
Sort By:
  • Logging and Log Management : The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and other IT 'Noise' - Anton Chuvakin
    Logging and Log Management
    The Authoritative Guide to Dealing with Syslog,...
    Anton Chuvakin, Kevin Schmidt and Chris Phillips
    eText
    Instant Online Reading*
    $59.95
    BUY EBOOK
  • Federal Cloud Computing : The Definitive Guide for Cloud Service Providers - Matthew Metheny
    Federal Cloud Computing
    The Definitive Guide for Cloud Service Providers
    Matthew Metheny
    eText
    Instant Online Reading*
    $82.95
    BUY EBOOK
  • Windows 2012 Server Network Security : Securing Your Windows Network Systems and Infrastructure - Derrick Rountree
    Windows 2012 Server Network Security
    Securing Your Windows Network Systems and Infra...
    Derrick Rountree
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Blackhatonomics : An Inside Look at the Economics of Cybercrime - Will Gragido
    Blackhatonomics
    An Inside Look at the Economics of Cybercrime
    Will Gragido, Daniel Molina, John Pirc and Nick Selby
    eText
    Instant Online Reading*
    $46.95
    BUY EBOOK
  • Computer Viruses and Malware - John Aycock
    Computer Viruses and Malware
    John Aycock
    eText
    Instant Online Reading*
    $209.00
    BUY EBOOK
  • Understanding High-Dimensional Spaces - David B. Skillicorn
    Understanding High-Dimensional Spaces
    David B. Skillicorn
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Forensic Computing - Anthony Sammes
    Forensic Computing
    Anthony Sammes and Brian Jenkinson
    eText
    Instant Online Reading*
    $119.00
    BUY EBOOK
  • Hot Pre-Orders
  • Computer Network Security - Joseph Migga Kizza
    Computer Network Security
    Joseph Migga Kizza
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Foundations of Computer Security - David Salomon
    Foundations of Computer Security
    David Salomon
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Algebraic Aspects of the Advanced Encryption Standard - Carlos Cid
    Algebraic Aspects of the Advanced Encryption Standard
    Carlos Cid, Sean Murphy and Matthew Robshaw
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Ethical and Social Issues in the Information Age : Computer Science (R0) - Joseph Migga Kizza
    Ethical and Social Issues in the Information Age
    Computer Science (R0)
    Joseph Migga Kizza
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Complexity Theory and Cryptology : An Introduction to Cryptocomplexity - Jörg Rothe
    Complexity Theory and Cryptology
    An Introduction to Cryptocomplexity
    Jörg Rothe
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cryptographic Protocol : Security Analysis Based on Trusted Freshness - Ling Dong
    Cryptographic Protocol
    Security Analysis Based on Trusted Freshness
    Ling Dong and Kefei Chen
    eText
    Instant Online Reading*
    $269.01
    BUY EBOOK
  • Information Technology Convergence, Secure and Trust Computing, and Data Management : ITCS 2012 & STA 2012 - Jong Hyuk (James) Park
    Information Technology Convergence, Secure and Trust Computing, and Data Management
    ITCS 2012 & STA 2012
    Jong Hyuk (James) Park
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Trustworthy Ubiquitous Computing - Ismail. Khalil
    Trustworthy Ubiquitous Computing
    Ismail. Khalil and Teddy. Mantoro
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • The Oracle Hacker's Handbook : Hacking and Defending Oracle - David Litchfield
    The Oracle Hacker's Handbook
    Hacking and Defending Oracle
    David Litchfield
    eText
    Instant Online Reading*
    $65.99
    BUY EBOOK
  • The e-Policy Handbook : Rules and Best Practices to Safely Manage Your Company's E-Mail, Blogs, Social Networking, and Other Electronic Communication T - Nancy FLYNN
    The e-Policy Handbook
    Rules and Best Practices to Safely Manage Your ...
    Nancy FLYNN
    eBook
    Instant Digital Delivery
    $12.99
    BUY EBOOK
  • Applied Cryptanalysis: Breaking Ciphers in the Real World : Breaking Ciphers in the Real World - Mark Stamp
    Applied Cryptanalysis: Breaking Ciphers in the Real World
    Breaking Ciphers in the Real World
    Mark Stamp and Richard M. Low
    eText
    Instant Online Reading*
    $201.29
    BUY EBOOK
  • IT Security Interviews Exposed : Secrets to Landing Your Next Information Security Job - Chris Butler
    IT Security Interviews Exposed
    Secrets to Landing Your Next Information Securi...
    Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles and Brian Ki
    eText
    Instant Online Reading*
    $36.29
    BUY EBOOK
  • Information : A Very Short Introduction - Luciano Floridi
    Information
    A Very Short Introduction
    Luciano Floridi
    eText
    Instant Online Reading*
    $16.78
    BUY EBOOK
  • Everyday Cryptography : Fundamental Principles and Applications - Keith M. Martin
    Everyday Cryptography
    Fundamental Principles and Applications
    Keith M. Martin
    eText
    Instant Online Reading*
    $55.96
    BUY EBOOK
  • Cyber Bullying : Protecting Kids and Adults from Online Bullies - Samuel C. McQuade III
    Cyber Bullying
    Protecting Kids and Adults from Online Bullies
    Samuel C. McQuade III, James P. Colt and Nancy Meyer
    eText
    Instant Online Reading*
    $68.40
    BUY EBOOK
  • Data Governance : How to Design, Deploy and Sustain an Effective Data Governance Program - John Ladley
    Data Governance
    How to Design, Deploy and Sustain an Effective ...
    John Ladley
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems - Jerzy Pejas
    Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
    Jerzy Pejas and ?Andrzej Piegat
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • A Classical Introduction to Cryptography Exercise Book - Thomas Baigneres
    A Classical Introduction to Cryptography Exercise Book
    Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay
    eText
    Instant Online Reading*
    $69.99
    BUY EBOOK
  • Handbook of Multibiometrics - Arun A. Ross
    Handbook of Multibiometrics
    Arun A. Ross, Karthik Nandakumar and Anil K. Jain
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Biometrics, Computer Security Systems and Artificial Intelligence Applications - Khalid Saeed
    Biometrics, Computer Security Systems and Artificial Intelligence Applications
    Khalid Saeed, Jerzy Pejas and Romuald Mosdorf
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Reliable Face Recognition Methods : System Design, Implementation and Evaluation - Harry Wechsler
    Reliable Face Recognition Methods
    System Design, Implementation and Evaluation
    Harry Wechsler
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks : For Wireless Sensor and Ad Hoc Networks - Radha Poovendran
    Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
    For Wireless Sensor and Ad Hoc Networks
    Sumit Roy (Ph. D. EE.), Radha Poovendran and Cliff Wang
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • TNF Receptor Associated Factors (TRAFs) - Hao Wu
    TNF Receptor Associated Factors (TRAFs)
    Hao Wu
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Client Side Attacks and Defense - Sean-Philip Oriyano
    Client Side Attacks and Defense
    Sean-Philip Oriyano and Robert Shimonski
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • ISSE 2006 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2006 Conference - Sachar Paulus
    ISSE 2006 Securing Electronic Business Processes
    Highlights of the Information Security Solution...
    Sachar Paulus, ?Norbert Pohlmann and ?Helmut Reimer
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • ISSE 2010 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2010 Conference - Norbert Pohlmann
    ISSE 2010 Securing Electronic Business Processes
    Highlights of the Information Security Solution...
    Norbert Pohlmann
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Processing and Security Systems - Khalid Saeed
    Information Processing and Security Systems
    Khalid Saeed and ?Jerzy Pejas
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Preserving Privacy in On-Line Analytical Processing (OLAP) - Lingyu Wang
    Preserving Privacy in On-Line Analytical Processing (OLAP)
    Lingyu Wang, Sushil Jajodia and Duminda Wijesekera
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Computer Insecurity : Risking the System - Steven M. Furnell
    Computer Insecurity
    Risking the System
    Steven M. Furnell
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Reliability and Availability of Cloud Computing - Eric Bauer
    Reliability and Availability of Cloud Computing
    Eric Bauer and Randee Adams
    eText
    Instant Online Reading*
    $146.29
    BUY EBOOK
  • Joomla! Web Security : Secure You Joomla! Website from Common Security Threats With This Easy-to-use Guide - Tom Canavan
    Joomla! Web Security
    Secure You Joomla! Website from Common Security...
    Tom Canavan
    eText
    Instant Online Reading*
    $53.89
    My Library BUY EBOOK
  • Securing SQL Server : Protecting Your Database from Attackers - Denny Cherry
    Securing SQL Server
    Protecting Your Database from Attackers
    Denny Cherry
    eText
    Instant Online Reading*
    $58.99
    BUY EBOOK
  • Configuring IPCop Firewalls : Closing Borders with Open Source - Barrie Dempster
    Configuring IPCop Firewalls
    Closing Borders with Open Source
    Barrie Dempster and James Eaton-Lee
    eText
    Instant Online Reading*
    $53.89
    My Library BUY EBOOK
  • PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance - Branden R. Williams
    PCI Compliance
    Understand and Implement Effective PCI Data Sec...
    Branden R. Williams and Anton Chuvakin
    eText
    Instant Online Reading*
    $70.99
    BUY EBOOK
  • Image and Video Encryption : From Digital Rights Management to Secured Personal Communication - Andreas Uhl
    Image and Video Encryption
    From Digital Rights Management to Secured Perso...
    Andreas Uhl and Andreas Pommer
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Mastering Windows Network Forensics and Investigation - Steve Anson
    Mastering Windows Network Forensics and Investigation
    Steve Anson, Steve Bunting, Ryan Johnson and Scott Pearson
    eText
    Instant Online Reading*
    $71.49
    BUY EBOOK
  • Keys to the Kingdom : Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks - Deviant Ollam
    Keys to the Kingdom
    Impressioning, Privilege Escalation, Bumping, a...
    Deviant Ollam
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Practical Lock Picking : A Physical Penetration Tester's Training Guide - Deviant Ollam
    Practical Lock Picking
    A Physical Penetration Tester's Training Guide
    Deviant Ollam
    eText
    Instant Online Reading*
    $58.99
    BUY EBOOK
  • Web Security, Privacy & Commerce : Security for Users, Administrators and ISPs - Simson Garfinkel
    Web Security, Privacy & Commerce
    Security for Users, Administrators and ISPs
    Simson Garfinkel and Gene Spafford
    eText
    Instant Online Reading*
    $50.59
    BUY EBOOK
  • Guide to Wireless Network Security - John R. Vacca
    Guide to Wireless Network Security
    John R. Vacca
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • ISSE 2008 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2008 Conference - Norbert Pohlmann
    ISSE 2008 Securing Electronic Business Processes
    Highlights of the Information Security Solution...
    Norbert Pohlmann, Helmut Reimer and Wolfgang Schneider
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security Risk Assessment Toolkit : Practical Assessments through Data Collection and Data Analysis - Mark Talabis
    Information Security Risk Assessment Toolkit
    Practical Assessments through Data Collection a...
    Mark Talabis and Jason Martin
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • Hacking Web Apps : Detecting and Preventing Web Application Security Problems - Mike Shema
    Hacking Web Apps
    Detecting and Preventing Web Application Securi...
    Mike Shema
    eText
    Instant Online Reading*
    $58.95
    BUY EBOOK
  • CISSP Study Guide - Eric Conrad
    CISSP Study Guide
    Eric Conrad, Seth Misenar and Joshua Feldman
    eText
    Instant Online Reading*
    $70.99
    BUY EBOOK
  • Hardware-based Computer Security Techniques to Defeat Hackers : From Biometrics to Quantum Cryptography - Roger R. Dube
    Hardware-based Computer Security Techniques to Defeat Hackers
    From Biometrics to Quantum Cryptography
    Roger R. Dube
    eText
    Instant Online Reading*
    $211.19
    BUY EBOOK
  • Access Denied : The Practice and Policy of Global Internet Filtering - Ronald Deibert
    Access Denied
    The Practice and Policy of Global Internet Filt...
    Ronald Deibert, John Palfrey, Rafal Rohozinski and Jonathan Zittrain
    eText
    Instant Online Reading*
    $16.87
    BUY EBOOK
  • Burdens of Proof : Cryptographic Culture and Evidence Law in the Age of Electronic Documents - Jean-Francois Blanchette
    Burdens of Proof
    Cryptographic Culture and Evidence Law in the A...
    Jean-Francois Blanchette
    eText
    Instant Online Reading*
    $42.20
    BUY EBOOK
  • Network Security : A Practical Guide - Owen Poole
    Network Security
    A Practical Guide
    Owen Poole
    eText
    Instant Online Reading*
    $118.80
    BUY EBOOK
  • Mobile Computing : Securing your workforce - BCS The Chartered Institute For IT
    Mobile Computing
    Securing your workforce
    BCS The Chartered Institute For IT
    eText
    Instant Online Reading*
    $5.92
    BUY EBOOK
  • Computer Misuse : Response, Regulation and the Law - Stefan Fafinski
    Computer Misuse
    Response, Regulation and the Law
    Stefan Fafinski
    eText
    Instant Online Reading*
    $88.00
    BUY EBOOK
  • The Browser Hacker's Handbook - Wade Alcorn
    The Browser Hacker's Handbook
    Wade Alcorn, Christian Frichot and Michele Orru
    eBook
    Instant Digital Delivery
    $76.99
    BUY EBOOK
  • Casting Light on the Dark Web : A Guide for Safe Exploration - Matthew Beckstrom
    Casting Light on the Dark Web
    A Guide for Safe Exploration
    Matthew Beckstrom and Brady Lund
    eText
    Instant Online Reading*
    $54.01
    BUY EBOOK
  • Cryptography Apocalypse : Preparing for the Day When Quantum Computing Breaks Today's Crypto - Roger A. Grimes
    Cryptography Apocalypse
    Preparing for the Day When Quantum Computing Br...
    Roger A. Grimes
    eText
    Instant Online Reading*
    $41.79
    BUY EBOOK
  • Security Fundamentals - Crystal Panek
    Security Fundamentals
    Crystal Panek
    eText
    Instant Online Reading*
    $47.29
    BUY EBOOK
  • Cybersecurity Law - Jeff Kosseff
    Cybersecurity Law
    Jeff Kosseff
    eText
    Instant Online Reading*
    $174.99
    BUY EBOOK
  • Penetration Testing : A guide for business and IT managers - Nick Furneaux
    Penetration Testing
    A guide for business and IT managers
    Nick Furneaux, Jims Marchang, Rob Ellis, Jason Charalambous and Roderick
    eText
    Instant Online Reading*
    $62.36
    BUY EBOOK
  • Tribe of Hackers Red Team : Tribal Knowledge from the Best in Offensive Cybersecurity - Marcus J. Carey
    Tribe of Hackers Red Team
    Tribal Knowledge from the Best in Offensive Cyb...
    Marcus J. Carey and Jennifer Jin
    eText
    Instant Online Reading*
    $30.79
    BUY EBOOK
  • Tribe of Hackers : Cybersecurity Advice from the Best Hackers in the World - Marcus J. Carey
    Tribe of Hackers
    Cybersecurity Advice from the Best Hackers in t...
    Marcus J. Carey and Jennifer Jin
    eText
    Instant Online Reading*
    $30.79
    BUY EBOOK
  • Providing Sound Foundations for Cryptography : On the work of Shafi Goldwasser and Silvio Micali - Oded Goldreich
    Providing Sound Foundations for Cryptography
    On the work of Shafi Goldwasser and Silvio Micali
    Oded Goldreich
    eBook
    Instant Digital Delivery
    RRP $135.50
    $121.99
    BUY EBOOK
  • Adversarial Machine Learning : Synthesis Lectures on Artificial Intelligence and Machine Learning - Yevgeniy Vorobeychik
    Adversarial Machine Learning
    Synthesis Lectures on Artificial Intelligence a...
    Yevgeniy Vorobeychik, Murat Kantarcioglu, Ronald Brachman, Peter Stone and Francesca Rossi
    eBook
    Instant Digital Delivery
    RRP $94.83
    $85.99
    BUY EBOOK
  • Cybersecurity Essentials - Charles J. Brooks
    Cybersecurity Essentials
    Charles J. Brooks, Christopher Grow, Donald Short and Philip A. Craig Jr.
    eBook
    Instant Digital Delivery
    $45.99
    BUY EBOOK
  • Privacy in Mobile and Pervasive Computing : Synthesis Lectures on Mobile and Pervasive Computing - Marc Langheinrich
    Privacy in Mobile and Pervasive Computing
    Synthesis Lectures on Mobile and Pervasive Comp...
    Marc Langheinrich, Florian Schaub and Mahadev Satyanarayanan
    eBook
    Instant Digital Delivery
    RRP $74.49
    $67.99
    BUY EBOOK
  • The Digital Big Bang : The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity - Phil Quade
    The Digital Big Bang
    The Hard Stuff, the Soft Stuff, and the Future ...
    Phil Quade
    eText
    Instant Online Reading*
    $36.29
    BUY EBOOK
  • Cybercrime Investigators Handbook - Graeme Edwards
    Cybercrime Investigators Handbook
    Graeme Edwards
    eText
    Instant Online Reading*
    $95.69
    BUY EBOOK
  • Security Operations in Practice - Mike Sheward
    Security Operations in Practice
    Mike Sheward
    eText
    Instant Online Reading*
    $62.36
    BUY EBOOK
  • Cryptographic Hardware and Embedded Systems -- CHES 2015 : 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings - Author
    Cryptographic Hardware and Embedded Systems -- CHES 2015
    17th International Workshop, Saint-Malo, France...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security and Cryptology : 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers - Author
    Information Security and Cryptology
    9th International Conference, Inscrypt 2013, Gu...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security and Cryptology -- ICISC 2013 : 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers - Hyang-Sook Lee
    Information Security and Cryptology -- ICISC 2013
    16th International Conference, Seoul, Korea, No...
    Hyang-Sook Lee and Dong-Guk Han
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Sequences and Their Applications - SETA 2014 : 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings - Author
    Sequences and Their Applications - SETA 2014
    8th International Conference, Melbourne, VIC, A...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Security Protocols XXII : 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers - Author
    Security Protocols XXII
    22nd International Workshop, Cambridge, UK, Mar...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Neural Networks - ISNN 2016 : 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings - Long Cheng
    Advances in Neural Networks - ISNN 2016
    13th International Symposium on Neural Networks...
    Long Cheng, Qingshan Liu and Andrey Ronzhin
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology - EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III - Author
    Advances in Cryptology - EUROCRYPT 2019
    38th Annual International Conference on the The...
    Author
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Human Centered Computing : 4th International Conference, HCC 2018, Merida, Mexico, December, 5-7, 2018, Revised Selected Papers - Yong Tang
    Human Centered Computing
    4th International Conference, HCC 2018, Merida,...
    Yong Tang, Qiaohong Zu and José G. Rodríguez García
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Economics of Grids, Clouds, Systems, and Services : 15th International Conference, GECON 2018, Pisa, Italy, September 18-20, 2018, Proceedings - Author
    Economics of Grids, Clouds, Systems, and Services
    15th International Conference, GECON 2018, Pisa...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings - Sara Foresti
    Information Security Theory and Practice
    10th IFIP WG 11.2 International Conference, WIS...
    Sara Foresti and Javier Lopez
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I - Xingming Sun
    Cloud Computing and Security
    Second International Conference, ICCCS 2016, Na...
    Xingming Sun, Alex Liu, Elisa Bertino and Han-Chieh Chao
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cloud Computing and Security : Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II - Xingang You
    Cloud Computing and Security
    Third International Conference, ICCCS 2017, Nan...
    Xingang You, Xingming Sun, Han-Chieh Chao and Elisa Bertino
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Intelligent Computing Methodologies : 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part III - Author
    Intelligent Computing Methodologies
    14th International Conference, ICIC 2018, Wuhan...
    Author
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Data and Applications Security and Privacy XXXII : 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings - Florian Kerschbaum
    Data and Applications Security and Privacy XXXII
    32nd Annual IFIP WG 11.3 Conference, DBSec 2018...
    Florian Kerschbaum and Stefano Paraboschi
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Intelligent Computing Theories and Application : 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part II - De-Shuang Huang
    Intelligent Computing Theories and Application
    14th International Conference, ICIC 2018, Wuhan...
    De-Shuang Huang, Kang-Hyun Jo and Xiao-Long Zhang
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Secure IT Systems : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings - Juha Röning
    Secure IT Systems
    21st Nordic Conference, NordSec 2016, Oulu, Fin...
    Juha Röning and Billy Bob Brumley
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Systems Security : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings - Indrajit Ray
    Information Systems Security
    12th International Conference, ICISS 2016, Jaip...
    Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi and V. Kamakoti
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Principles of Security and Trust : 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings - Matteo Maffei
    Principles of Security and Trust
    6th International Conference, POST 2017, Held a...
    Matteo Maffei and Mark Ryan
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Knowledge Discovery and Data Mining : 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part II - Qiang Yang
    Advances in Knowledge Discovery and Data Mining
    23rd Pacific-Asia Conference, PAKDD 2019, Macau...
    Qiang Yang, Zhi-Hua Zhou, Zhiguo Gong, Min-Ling Zhang and Sheng-Jun Huang
    eText
    Instant Online Reading*
    $129.00
    BUY EBOOK
  • Theory of Cryptography : 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II - Yael Kalai
    Theory of Cryptography
    15th International Conference, TCC 2017, Baltim...
    Yael Kalai and Leonid Reyzin
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity - Marina L. Gavrilova
    Transactions on Computational Science XXX
    Special Issue on Cyberworlds and Cybersecurity
    Marina L. Gavrilova, C.J. Kenneth Tan and Alexei Sourin
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification : First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings - Thierry Lecomte
    Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification
    First International Conference, RSSRail 2016, P...
    Thierry Lecomte, Ralf Pinger and Alexander Romanovsky
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Electronic Voting : Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings - Robert Krimmer
    Electronic Voting
    Second International Joint Conference, E-Vote-I...
    Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting and Carsten Schürmann
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings - Author
    Provable Security
    11th International Conference, ProvSec 2017, Xi...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology - EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I - Yuval Ishai
    Advances in Cryptology - EUROCRYPT 2019
    38th Annual International Conference on the The...
    Yuval Ishai and Vincent Rijmen
    eText
    Instant Online Reading*
    $189.00
    BUY EBOOK
  • Post-Quantum Cryptography : 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings - Tsuyoshi Takagi
    Post-Quantum Cryptography
    7th International Workshop, PQCrypto 2016, Fuku...
    Tsuyoshi Takagi
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Financial Cryptography and Data Security : FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers - Michael Brenner
    Financial Cryptography and Data Security
    FC 2017 International Workshops, WAHC, BITCOIN,...
    Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller and Markus Jakobsson
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
8593 Results | View 24 / 100
< 1 ... 10 11 12 13 14 ... 86 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW