Hello! Enter your postcode for delivery time
Track My Order
Help Centre
Likes
Notifications
My Wish Lists Login / Join
My Wish Lists My Account Sign Out
No new notifications.
Booktopia
Australia's local bookstore
  • ALL
  • BOOKS
  • FICTION
  • NON-FICTION
  • AUSTRALIAN
  • KIDS
  • SCHOOL
  • ACADEMIC & TEXTBOOKS
      • University

      • Accounting, Business & Finance
      • Biology & Science
      • Computing & Programming
      • Education
      • Engineering & Physics
      • English & Literature
      • Environment & Planning
      • Health Care
      • History
      • Language
      •  

      • Law
      • Mathematics & Statistics
      • Media, Communication & Arts
      • Medicine
      • Nursing
      • Politics
      • Psychology
      • Social Sciences
      • Study Skills
      • Vocational

      • Trades
      • Hospitality & Tourism
      • Business, Financial & Management
      • Nursing & Health Care
      • IT, Networking & Computer Repair
      • Education & Early Childhood
      • Social Working & Counselling
      • Design, Art, Fashion & Photography
    Explore All Academic >
  • EBOOKS
      • Fiction

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Kids & YA

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
      • Non-Fiction

      • Biographies
      • Mind, Body, Spirit
      • Business & Management
      • Family & Health
      • Gardening
      • History
      • Politics & Government
      • Psychology
      • Science
      • Textbooks

      • Education
      • Medicine
      • Accounting & Finance
      • Law
      • Psychology
      • Mathematics
      • Language & Linguistics
    Explore All eBooks >
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFTS
  • BARGAINS
  • BLOG
  • BOOKS
  • EBOOKS
  • AUDIOBOOKS
  • GAMES & PUZZLES
  • STATIONERY
  • GIFT IDEAS
  • BLOG
 
CHECKOUT
  • FICTION

      Browse Fiction

    • New Releases
    • Coming Soon
    • Bestselling
      • Popular Subjects

      • Romance
      • Crime & Mystery
      • Erotic Fiction
      • Children's Fiction
      • Fantasy
      • Thrillers
      • Science Fiction
      • Popular Authors

      • Danielle Steel
      • E L James
      • James Patterson
      • Kerry Greenwood
      • Lee Child
      • Michael Connelly
      • Peter Corris
      • Popular Series

      • Text Classics
    Explore All Fiction >
  • NON-FICTION

      Browse Non-Fiction

    • Bestselling
      • Subjects

      • Accounting & Finance
      • Animals & Nature
      • Antiques & Collectables
      • Archaeology
      • Arts & Entertainment
      • Biographies & True Stories
      • Business & Management
      • Children's Non-Fiction
      • Comedy & Humour
      • Computing & I.T.
      • Cooking, Food & Drink
      • Crafts & Handiwork
      • Dictionaries
      • Earth Sciences & Environment
      • Economics
      • Education
      •  

      • Engineering & Technology
      • Family & Health
      • Gardening
      • History
      • Hobbies, Games & Puzzles
      • Home & House Maintenance
      • Industry & Industrial Studies
      • Language & Linguistics
      • Law
      • Library & Info Sciences
      • Lifestyle & Fashion
      • Literature, Poetry & Plays
      • Mathematics
      • Medicine
      • Mind, Body, Spirit
      • Philosophy
      •  

      • Politics & Government
      • Psychology
      • Reference & Encyclopaedias
      • Religion & Beliefs
      • Science
      • Self-Help & Personal Development
      • Social Services & Welfare
      • Society & Culture
      • Sociology & Anthropology
      • Sports & Recreation
      • Teaching English (ELT)
      • Transportation
      • Travel & Holidays
      • Travel Maps & Atlases
      • Warfare & Defence
    Explore All Non-Fiction >
  • TEXTBOOKS
  • KIDS & YA

      Browse Kids & YA

    • New Releases
    • Bestselling
      • Popular Subjects

      • Children's Fiction
      • Romance & Love Stories
      • Picture Books & Early Learning
      • Children's Non-Fiction
    Explore All Kids & YA
  • EREADERS
  • KOBO PLUS
eBooks > Non-Fiction > Computing & I.T. > Computer Security > Data Encryption
Get Free Shipping on orders over $79

Data Encryption

REFINE YOUR RESULTS

SUBJECTS

  • Computer Viruses
  • Data Encryption

LISTS

  • All eBooks (8234)
  • Australian Authors Books (1)
  • Books (7293)
  • Audiobooks (395)
  • eTextbooks (6472)

AVAILABILITY

  • All eBooks (8234)
  • New Releases (315)
  • Coming Soon (23)
  • Subscription eBooks (1344)

PRICE

CUSTOMER RATING

  •  
    (1) 
  •  
    & Up (2) 
  •  
    & Up (2) 

FORMATS

LANGUAGE

  • eBook
    (8234)
  • Books
    (7293)
  • Audiobooks
    (395)
  • Audio CDs
    (1)
8234 Results | View 24 / 100
< 1 ... 73 74 75 76 77 ... 83 >
Sort By
Sort By:
  • Advances in Cryptology - EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I - Jesper Buus Nielsen
    Advances in Cryptology - EUROCRYPT 2018
    37th Annual International Conference on the The...
    Jesper Buus Nielsen and Vincent Rijmen
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security Education Across the Curriculum : 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings - Matt Bishop
    Information Security Education Across the Curriculum
    9th IFIP WG 11.8 World Conference, WISE 9, Hamb...
    Matt Bishop, Natalia Miloslavskaya and Marianthi Theocharidou
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Secure and Trustworthy Transportation Cyber-Physical Systems : Computer Science (R0) - Yunchuan Sun
    Secure and Trustworthy Transportation Cyber-Physical Systems
    Computer Science (R0)
    Yunchuan Sun and Houbing Song
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications : Computer Science (R0) - Zhou Lu
    Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
    Computer Science (R0)
    Zhou Lu, Wenye Wang and Cliff Wang
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Fundamental Computing Forensics for Africa : A Case Study of the Science in Nigeria - Aamo Iorliam
    Fundamental Computing Forensics for Africa
    A Case Study of the Science in Nigeria
    Aamo Iorliam
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Android Application Security : A Semantics and Context-Aware Approach - Mu Zhang
    Android Application Security
    A Semantics and Context-Aware Approach
    Mu Zhang and Heng Yin
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Advanced Information Systems Engineering Workshops : CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings - Author
    Advanced Information Systems Engineering Workshops
    CAiSE 2015 International Workshops, Stockholm, ...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Afterpay
  • Smart TV Security : Media Playback and Digital Video Broadcast - Benjamin Michéle
    Smart TV Security
    Media Playback and Digital Video Broadcast
    Benjamin Michéle
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Diffusion in Social Networks : Computer Science (R0) - Paulo Shakarian
    Diffusion in Social Networks
    Computer Science (R0)
    Paulo Shakarian, Abhivav Bhatnagar, Ashkan Aleali, Elham Shaabani and Ruocheng Guo
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Security for Wireless Implantable Medical Devices : Computer Science (R0) - Xiali Hei
    Security for Wireless Implantable Medical Devices
    Computer Science (R0)
    Xiali Hei and Xiaojiang Du
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices - Tatiana Galibus
    Elements of Cloud Storage Security
    Concepts, Designs and Optimized Practices
    Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque and Edison Pignaton de Freitas
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Physical Layer Approaches for Securing Wireless Communication Systems : Computer Science (R0) - Hong Wen
    Physical Layer Approaches for Securing Wireless Communication Systems
    Computer Science (R0)
    Hong Wen
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Smart Trends in Systems, Security and Sustainability : Proceedings of WS4 2017 - Author
    Smart Trends in Systems, Security and Sustainability
    Proceedings of WS4 2017
    Author
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Innovations in Computer Science and Engineering : Proceedings of the Sixth ICICSE 2018 - H. S. Saini
    Innovations in Computer Science and Engineering
    Proceedings of the Sixth ICICSE 2018
    H. S. Saini
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Cyber Security : Deterrence and IT Protection for Critical Infrastructures - Maurizio Martellini
    Cyber Security
    Deterrence and IT Protection for Critical Infra...
    Maurizio Martellini
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Querying over Encrypted Data in Smart Grids : Computer Science (R0) - Mi Wen
    Querying over Encrypted Data in Smart Grids
    Computer Science (R0)
    Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei and Xuemin (Sherman) Shen
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Secure IP Mobility Management for VANET : SpringerBriefs in Computer Science - Sanaa Taha
    Secure IP Mobility Management for VANET
    SpringerBriefs in Computer Science
    Sanaa Taha and Xuemin Shen
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Practical Security Properties on Commodity Computing Platforms : The uber eXtensible Micro-Hypervisor Framework - Amit Vasudevan
    Practical Security Properties on Commodity Computing Platforms
    The uber eXtensible Micro-Hypervisor Framework
    Amit Vasudevan
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Foundations of Information Security : A Straightforward Introduction - Jason Andress
    Foundations of Information Security
    A Straightforward Introduction
    Jason Andress
    eText
    Instant Online Reading*
    $54.01
    BUY EBOOK
  • Creating Your Digital Estate Plan - Judith Kolberg
    Creating Your Digital Estate Plan
    Judith Kolberg
    eBook
    Instant Digital Delivery
    $16.95
    BUY EBOOK
  • Social Network Analysis in Predictive Policing : Concepts, Models and Methods - Mohammad A. Tayebi
    Social Network Analysis in Predictive Policing
    Concepts, Models and Methods
    Mohammad A. Tayebi and Uwe Glässer
    eText
    Instant Online Reading*
    $119.00
    BUY EBOOK
  • Lattice-Based Public-Key Cryptography in Hardware : Computer Architecture and Design Methodologies - Sujoy Sinha Roy
    Lattice-Based Public-Key Cryptography in Hardware
    Computer Architecture and Design Methodologies
    Sujoy Sinha Roy and Ingrid Verbauwhede
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Tests and Proofs : 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings - Catherine Dubois
    Tests and Proofs
    12th International Conference, TAP 2018, Held a...
    Catherine Dubois and Burkhart Wolff
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part I - J. K. Mandal
    Computational Intelligence, Communications, and Business Analytics
    First International Conference, CICBA 2017, Kol...
    J. K. Mandal, Paramartha Dutta and Somnath Mukhopadhyay
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Parallel Architecture, Algorithm and Programming : 8th International Symposium, PAAP 2017, Haikou, China, June 17-18, 2017, Proceedings - Guoliang Chen
    Parallel Architecture, Algorithm and Programming
    8th International Symposium, PAAP 2017, Haikou,...
    Guoliang Chen, Mingrui Chen and Hong Shen
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part II - Author
    Computational Intelligence, Communications, and Business Analytics
    First International Conference, CICBA 2017, Kol...
    Author
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Lattices Applied to Coding for Reliable and Secure Communications : SpringerBriefs in Mathematics - Sueli I. R. Costa
    Lattices Applied to Coding for Reliable and Secure Communications
    SpringerBriefs in Mathematics
    Sueli I. R. Costa, Frédérique Oggier, Antonio Campello, Jean-Claude Belfiore and Emanuele Viterbo
    eText
    Instant Online Reading*
    $89.00
    BUY EBOOK
  • Guide to Digital Forensics : A Concise and Practical Introduction - Joakim Kävrestad
    Guide to Digital Forensics
    A Concise and Practical Introduction
    Joakim Kävrestad
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Game Theory for Security and Risk Management : From Theory to Practice - Stefan Rass
    Game Theory for Security and Risk Management
    From Theory to Practice
    Stefan Rass and Stefan Schauer
    eText
    Instant Online Reading*
    $219.00
    BUY EBOOK
  • Security Assessment in Vehicular Networks : SpringerBriefs in Computer Science - Suguo Du
    Security Assessment in Vehicular Networks
    SpringerBriefs in Computer Science
    Suguo Du and Haojin Zhu
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Emerging Technology in Modelling and Graphics : Proceedings of IEM Graph 2018 - Jyotsna Kumar Mandal
    Emerging Technology in Modelling and Graphics
    Proceedings of IEM Graph 2018
    Jyotsna Kumar Mandal and Debika Bhattacharya
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks : SpringerBriefs in Computer Science - Jin Tang
    Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
    SpringerBriefs in Computer Science
    Jin Tang and Yu Cheng
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Computing and Network Sustainability : Proceedings of IRSCNS 2018 - Sheng-Lung Peng
    Computing and Network Sustainability
    Proceedings of IRSCNS 2018
    Sheng-Lung Peng
    eText
    Instant Online Reading*
    $319.00
    BUY EBOOK
  • Feistel Ciphers : Security Proofs and Cryptanalysis - Valerie Nachef
    Feistel Ciphers
    Security Proofs and Cryptanalysis
    Valerie Nachef, Jacques Patarin and Emmanuel Volte
    eText
    Instant Online Reading*
    $209.00
    BUY EBOOK
  • Understanding Social Engineering Based Scams : Computer Science (R0) - Markus Jakobsson
    Understanding Social Engineering Based Scams
    Computer Science (R0)
    Markus Jakobsson
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Fault Tolerant Architectures for Cryptography and Hardware Security : Computer Architecture and Design Methodologies - SIKHAR PATRANABIS
    Fault Tolerant Architectures for Cryptography and Hardware Security
    Computer Architecture and Design Methodologies
    SIKHAR PATRANABIS and Debdeep Mukhopadhyay
    eText
    Instant Online Reading*
    $219.00
    BUY EBOOK
  • Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings - Claude Carlet
    Security, Privacy, and Applied Cryptography Engineering
    6th International Conference, SPACE 2016, Hyder...
    Claude Carlet, M. Anwar Hasan and Vishal Saraswat
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Mathematical Software - ICMS 2018 : 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings - James H. Davenport
    Mathematical Software - ICMS 2018
    6th International Conference, South Bend, IN, U...
    James H. Davenport, Manuel Kauers, George Labahn and Josef Urban
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Location Privacy Protection in Mobile Networks : SpringerBriefs in Computer Science - Xinxin Liu
    Location Privacy Protection in Mobile Networks
    SpringerBriefs in Computer Science
    Xinxin Liu and Xiaolin Li
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Interoperability, Safety and Security in IoT : Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings - Giancarlo Fortino
    Interoperability, Safety and Security in IoT
    Third International Conference, InterIoT 2017, ...
    Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens and Alban Gabillon
    eText
    Instant Online Reading*
    $69.99
    BUY EBOOK
  • Android Malware : SpringerBriefs in Computer Science - Xuxian Jiang
    Android Malware
    SpringerBriefs in Computer Science
    Xuxian Jiang and Yajin Zhou
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Trustworthy Execution on Mobile Devices : Computer Science (R0) - Amit Vasudevan
    Trustworthy Execution on Mobile Devices
    Computer Science (R0)
    Amit Vasudevan, Jonathan M. McCune and James Newsome
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Knowledge Discovery and Data Mining : 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part II - Qiang Yang
    Advances in Knowledge Discovery and Data Mining
    23rd Pacific-Asia Conference, PAKDD 2019, Macau...
    Qiang Yang, Zhi-Hua Zhou, Zhiguo Gong, Min-Ling Zhang and Sheng-Jun Huang
    eText
    Instant Online Reading*
    $129.00
    BUY EBOOK
  • Transactions on Computational Science XXX : Special Issue on Cyberworlds and Cybersecurity - Marina L. Gavrilova
    Transactions on Computational Science XXX
    Special Issue on Cyberworlds and Cybersecurity
    Marina L. Gavrilova, C.J. Kenneth Tan and Alexei Sourin
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Progress in Cryptology - AFRICACRYPT 2019 : 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings - Johannes Buchmann
    Progress in Cryptology - AFRICACRYPT 2019
    11th International Conference on Cryptology in ...
    Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology - EUROCRYPT 2019 : 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II - Yuval Ishai
    Advances in Cryptology - EUROCRYPT 2019
    38th Annual International Conference on the The...
    Yuval Ishai and Vincent Rijmen
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Combatting Cybercrime and Cyberterrorism : Challenges, Trends and Priorities - Babak Akhgar
    Combatting Cybercrime and Cyberterrorism
    Challenges, Trends and Priorities
    Babak Akhgar and Ben Brewster
    eText
    Instant Online Reading*
    $169.00
    BUY EBOOK
  • Distributed Denial of Service Attack and Defense : Computer Science (R0) - Shui Yu
    Distributed Denial of Service Attack and Defense
    Computer Science (R0)
    Shui Yu
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Multimedia Forensics and Security : Foundations, Innovations, and Applications - Aboul Ella Hassanien
    Multimedia Forensics and Security
    Foundations, Innovations, and Applications
    Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani and Janusz Kacprzyk
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Security and Privacy in Mobile Social Networks : SpringerBriefs in Computer Science - Xiaohui Liang
    Security and Privacy in Mobile Social Networks
    SpringerBriefs in Computer Science
    Xiaohui Liang, Rongxing Lu, Xiaodong Lin and Xuemin Shen
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Algebraic Geometry for Coding Theory and Cryptography : IPAM, Los Angeles, CA, February 2016 - Everett W. Howe
    Algebraic Geometry for Coding Theory and Cryptography
    IPAM, Los Angeles, CA, February 2016
    Everett W. Howe
    eText
    Instant Online Reading*
    $219.00
    BUY EBOOK
  • Innovations in Computer Science and Engineering : Proceedings of the Fourth ICICSE 2016 - H. S. Saini
    Innovations in Computer Science and Engineering
    Proceedings of the Fourth ICICSE 2016
    H. S. Saini
    eText
    Instant Online Reading*
    $369.01
    BUY EBOOK
  • Engineering Applications of Neural Networks : 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings - Elias Pimenidis
    Engineering Applications of Neural Networks
    19th International Conference, EANN 2018, Brist...
    Elias Pimenidis and Chrisina Jayne
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Mathematics and Computing : Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings - Heinrich Begehr
    Mathematics and Computing
    Third International Conference, ICMC 2017, Hald...
    Heinrich Begehr, Ram N. Mohapatra, Debasis Giri and Mohammad S. Obaidat
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Network Hardening : An Automated Approach to Improving Network Security - Lingyu Wang
    Network Hardening
    An Automated Approach to Improving Network Secu...
    Lingyu Wang, Massimiliano Albanese and Sushil Jajodia
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Fraud Prevention in Online Digital Advertising : Computer Science (R0) - Xingquan Zhu
    Fraud Prevention in Online Digital Advertising
    Computer Science (R0)
    Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao and Jeremy Kayne
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Security for Cloud Storage Systems : SpringerBriefs in Computer Science - Kan Yang
    Security for Cloud Storage Systems
    SpringerBriefs in Computer Science
    Kan Yang and Xiaohua Jia
    eText
    Instant Online Reading*
    $64.99
    BUY EBOOK
  • Encrypted Email : The History and Technology of Message Privacy - Hilarie Orman
    Encrypted Email
    The History and Technology of Message Privacy
    Hilarie Orman
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Geometry, Algebra and Applications : From Mechanics to Cryptography - Author
    Geometry, Algebra and Applications
    From Mechanics to Cryptography
    Author
    eText
    Instant Online Reading*
    $119.00
    BUY EBOOK
  • Pervasive Wireless Environments : Detecting and Localizing User Spoofing - Jie Yang
    Pervasive Wireless Environments
    Detecting and Localizing User Spoofing
    Jie Yang, Yingying Chen, Wade Trappe and Jerry Cheng
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Compilation for Secure Multi-party Computation : Computer Science (R0) - Niklas Büscher
    Compilation for Secure Multi-party Computation
    Computer Science (R0)
    Niklas Büscher and Stefan Katzenbeisser
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Personal Analytics and Privacy. An Individual and Collective Perspective : First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers - Riccardo Guidotti
    Personal Analytics and Privacy. An Individual and Collective Perspective
    First International Workshop, PAP 2017, Held in...
    Riccardo Guidotti, Anna Monreale, Dino Pedreschi and Serge Abiteboul
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems : SpringerBriefs in Computer Science - Ilaiah Kavati
    Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems
    SpringerBriefs in Computer Science
    Ilaiah Kavati, Munaga V.N.K. Prasad and Chakravarthy Bhagvati
    eText
    Instant Online Reading*
    $82.49
    BUY EBOOK
  • Mobile Phone Security and Forensics : A Practical Approach - Iosif I. Androulidakis
    Mobile Phone Security and Forensics
    A Practical Approach
    Iosif I. Androulidakis
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • ICT Systems Security and Privacy Protection : 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings - Lech Jan Janczewski
    ICT Systems Security and Privacy Protection
    33rd IFIP TC 11 International Conference, SEC 2...
    Lech Jan Janczewski and Miros?aw Kuty?owski
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Cyber-Physical Systems Security : Computer Science (R0) - Çetin Kaya Koç
    Cyber-Physical Systems Security
    Computer Science (R0)
    Çetin Kaya Koç
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Machine Learning and Knowledge Discovery in Databases : European Conference, ECML PKDD 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part III - Ulf Brefeld
    Machine Learning and Knowledge Discovery in Databases
    European Conference, ECML PKDD 2018, Dublin, Ir...
    Ulf Brefeld, Edward Curry, Elizabeth Daly, Brian MacNamee and Neil Hurley
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Critical Information Infrastructures Security : 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers - Gregorio D'Agostino
    Critical Information Infrastructures Security
    12th International Conference, CRITIS 2017, Luc...
    Gregorio D'Agostino and Antonio Scala
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Financial Cryptography and Data Security : 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers - Jens Grossklags
    Financial Cryptography and Data Security
    20th International Conference, FC 2016, Christ ...
    Jens Grossklags and Bart Preneel
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Risk Assessment and Risk-Driven Testing : Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers - Michael Felderer
    Risk Assessment and Risk-Driven Testing
    Third International Workshop, RISK 2015, Berlin...
    Michael Felderer, Fredrik Seehusen, Marc-Florian Wendland and Jürgen Großmann
    eText
    Instant Online Reading*
    $64.99
    BUY EBOOK
  • An Introduction to Mathematical Cryptography : Mathematics and Statistics (R0) - Jeffrey Hoffstein
    An Introduction to Mathematical Cryptography
    Mathematics and Statistics (R0)
    Jeffrey Hoffstein, Jill Pipher and Joseph H. Silverman
    eText
    Instant Online Reading*
    $109.75
    BUY EBOOK
  • Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II - Jyotsna Kumar Mandal
    Computational Intelligence, Communications, and Business Analytics
    Second International Conference, CICBA 2018, Ka...
    Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta and Kousik Dasgupta
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Digital Watermarking Techniques in Curvelet and Ridgelet Domain : SpringerBriefs in Computer Science - Channapragada Rama Seshagiri Rao
    Digital Watermarking Techniques in Curvelet and Ridgelet Domain
    SpringerBriefs in Computer Science
    Channapragada Rama Seshagiri Rao and Munaga V.N.K. Prasad
    eText
    Instant Online Reading*
    $89.99
    BUY EBOOK
  • Artificial Intelligence Tools for Cyber Attribution : Computer Science (R0) - Eric Nunes
    Artificial Intelligence Tools for Cyber Attribution
    Computer Science (R0)
    Eric Nunes, Paulo Shakarian, Gerardo I. Simari and Andrew Ruef
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Innovations in Computer Science and Engineering : Proceedings of the Fifth ICICSE 2017 - H. S. Saini
    Innovations in Computer Science and Engineering
    Proceedings of the Fifth ICICSE 2017
    H. S. Saini
    eText
    Instant Online Reading*
    $239.00
    BUY EBOOK
  • Fire Doesn't Innovate : The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks - Kip Boyle
    Fire Doesn't Innovate
    The Executive's Practical Guide to Thriving in ...
    Kip Boyle
    eBook
    Instant Digital Delivery
    $8.46
    My Library BUY EBOOK
  • Security and Privacy for Implantable Medical Devices - Sandro Carrara
    Security and Privacy for Implantable Medical Devices
    Sandro Carrara and Wayne Burleson
    eText
    Instant Online Reading*
    $159.01
    BUY EBOOK
  • Financial Cryptography and Data Security : 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers - Sarah Meiklejohn
    Financial Cryptography and Data Security
    22nd International Conference, FC 2018, Nieuwpo...
    Sarah Meiklejohn and Kazue Sako
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Advances in Cryptology -- CRYPTO 2012 : 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings - Ran Canetti
    Advances in Cryptology -- CRYPTO 2012
    32nd Annual Cryptology Conference, Santa Barbar...
    Ran Canetti and Reihaneh Safavi-Naini
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Trustworthy Global Computing : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers - Martín Abadi
    Trustworthy Global Computing
    8th International Symposium, TGC 2013, Buenos A...
    Martín Abadi and Alberto Lluch Lafuente
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Cyber Minds : Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe - Shira Rubinoff
    Cyber Minds
    Insights on cybersecurity across the cloud, dat...
    Shira Rubinoff
    eText
    Instant Online Reading*
    $39.59
    My Library BUY EBOOK
  • Global Issues in Contemporary Policing : International Police Executive Symposium Co-Publications - Arvind Verma
    Global Issues in Contemporary Policing
    International Police Executive Symposium Co-Pub...
    Arvind Verma, Aiedeo Mintie Das, Dilip K. Das and John Eterno
    eText
    Instant Online Reading*
    $107.79
    BUY EBOOK
  • Quantum Information Theory - Mark M. Wilde
    Quantum Information Theory
    Mark M. Wilde
    eText
    Instant Online Reading*
    $155.00
    BUY EBOOK
  • Metasploit : The Penetration Tester's Guide - David Kennedy
    Metasploit
    The Penetration Tester's Guide
    David Kennedy, Jim O'Gorman, Devon Kearns and Mati Aharoni
    eText
    Instant Online Reading*
    $50.63
    BUY EBOOK
  • CEH Certified Ethical Hacker Practice Exams, Fourth Edition - Matt Walker
    CEH Certified Ethical Hacker Practice Exams, Fourth Edition
    Matt Walker
    eBook
    Instant Digital Delivery
    RRP $61.00
    $48.99
    20%
    OFF
    BUY EBOOK
  • Professional Help : How to Prevent and Fix Malware, Viruses, Spyware and Other Baddies - Annie Jean Brewer
    Professional Help
    How to Prevent and Fix Malware, Viruses, Spywar...
    Annie Jean Brewer
    eBook
    Instant Digital Delivery
    $4.99
    My Library BUY EBOOK
  • Securing Windows : How to Protect Your Computer Properly - Paul Salmon
    Securing Windows
    How to Protect Your Computer Properly
    Paul Salmon
    eBook
    Instant Digital Delivery
    $1.43
    My Library BUY EBOOK
  • The IoT Architect's Guide to Attainable Security and Privacy - Damilare D. Fagbemi
    The IoT Architect's Guide to Attainable Security and Privacy
    Damilare D. Fagbemi, JC Wheeler and David Wheeler
    eText
    Instant Online Reading*
    $100.09
    BUY EBOOK
  • Information Security Governance : Framework and Toolset for CISOs and Decision Makers - Andrej Volchkov
    Information Security Governance
    Framework and Toolset for CISOs and Decision Ma...
    Andrej Volchkov
    eText
    Instant Online Reading*
    $129.80
    BUY EBOOK
  • Networked Life : 20 Questions and Answers - Mung Chiang
    Networked Life
    20 Questions and Answers
    Mung Chiang
    eText
    Instant Online Reading*
    $61.95
    BUY EBOOK
  • Big Data : A Very Short Introduction - Dawn E. Holmes
    Big Data
    A Very Short Introduction
    Dawn E. Holmes
    eText
    Instant Online Reading*
    $15.62
    BUY EBOOK
  • Virtually Criminal : Crime, Deviance and Regulation Online - Matthew Williams
    Virtually Criminal
    Crime, Deviance and Regulation Online
    Matthew Williams
    eText
    Instant Online Reading*
    $115.50
    BUY EBOOK
  • The Politics of Cyberconflict : The Politics of Cyberconflict - Athina Karatzogianni
    The Politics of Cyberconflict
    The Politics of Cyberconflict
    Athina Karatzogianni
    eText
    Instant Online Reading*
    $102.29
    BUY EBOOK
  • Cybersecurity Ops with bash : Attack, Defend, and Analyze from the Command Line - Paul Troncone
    Cybersecurity Ops with bash
    Attack, Defend, and Analyze from the Command Line
    Paul Troncone and Carl Albing Ph.D.
    eText
    Instant Online Reading*
    $64.89
    BUY EBOOK
  • Cryptanalysis of Number Theoretic Ciphers : Computational Mathematics - Jr. Samuel S. Wagstaff
    Cryptanalysis of Number Theoretic Ciphers
    Computational Mathematics
    Jr. Samuel S. Wagstaff
    eText
    Instant Online Reading*
    $322.30
    BUY EBOOK
  • Edge Computing : A Primer - Jie Cao
    Edge Computing
    A Primer
    Jie Cao, Quan Zhang and Weisong Shi
    eText
    Instant Online Reading*
    $109.00
    BUY EBOOK
  • Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments : Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28-30, 2018, Proceedings - Issa Traore
    Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
    Second International Conference, ISDDC 2018, Va...
    Issa Traore, Isaac Woungang, Sherif Saad Ahmed and Yasir Malik
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Information Security and Cryptology - ICISC 2019 : 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers - Jae Hong Seo
    Information Security and Cryptology - ICISC 2019
    22nd International Conference, Seoul, South Kor...
    Jae Hong Seo
    eText
    Instant Online Reading*
    $84.99
    BUY EBOOK
  • Binary Analysis Cookbook : Actionable recipes for disassembling and analyzing binaries for security risks - Michael Born
    Binary Analysis Cookbook
    Actionable recipes for disassembling and analyz...
    Michael Born
    eText
    Instant Online Reading*
    $45.09
    My Library BUY EBOOK
8234 Results | View 24 / 100
< 1 ... 73 74 75 76 77 ... 83 >
Sort By
Sort By:

Join Our Newsletter

Head Office
34-48 Cosgrove Road, South Strathfield NSW 2136
ABN 90 679 610 890
MOBILE SITE

Help Centre

  • Placing An Order
  • Contact Booktopia
  • Terms Of Business
  • Privacy Policy
  • Become An Affiliate
  • Sitemap

Shipping

  • Track My Order
  • Standard Shipping
  • Express Shipping
  • Shipping Timeframes
  • Delivering Your Order
  • New Zealand Orders

About Booktopia

  • Your Local Bookstore
  • Why Buy From Booktopia?
  • Our Awards
  • Booktopia's Charities
  • Booktopia eBooks
  • Work With Us

Bestsellers

  • Babies & Toddlers' Bestseller List
  • Children's Bestseller List
  • Young Adults' Bestseller List
  • Fiction Bestseller List
  • Non-Fiction Bestseller List

Popular Brands

  • ABC Reading Eggs
  • Australian Women's Weekly
  • Bluey
  • Excel Education
  • Dr Seuss
  • For Dummies
  • Harvard Business Review
  • Harry Potter
  • LEGO
  • Little Golden Books
  • Lonely Planet Travel Books
  • No Fear Shakespeare
  • Penguin Black Classics
  • Peppa Pig
  • Teach Yourself
  • Vintage Classics
  • Where's Wally

Popular Series

  • A Court of Thorns and Roses
  • A Game of Thrones
  • Bridgerton
  • Diary of a Wimpy Kid
  • Dune
  • Jack Reacher
  • Jack West
  • Little People, Big Dreams
  • Lord of the Rings
  • Nevermoor
  • Outlander
  • The Bad Guys
  • The Treehouse Series
  • The Wheel of Time
  • The Witcher
  • Wings of Fire
  • Wolf Girl

Popular Authors

  • Brene Brown
  • Bruce Pascoe
  • David Walliams
  • Di Morrissey
  • Donna Hay
  • Fiona McIntosh
  • Helen Garner
  • Jane Harper
  • Liane Moriarty
  • Matthew Reilly
  • Peter FitzSimons
  • Sally Rooney
  • Sarah J. Maas
  • Taylor Jenkins Reid
  • Tim Winton
  • Trent Dalton
  • Yotam Ottolenghi

Popular Subjects

  • Biographies & True Stories
  • Business & Management
  • Cooking, Food & Drink
  • Crafts & Handiwork
  • Family & Health
  • Fitness & Diet
  • History
  • Self-Help & Personal Development
  • Australian Fiction
  • Crime & Mystery
  • Classic Fiction
  • Fantasy Fiction
  • Modern & Contemporary Fiction
  • Manga
  • Picture Books
  • Young Adult Fiction
Voted Australia’s Favourite Bookstore by Australian Book Buyers

© 2026 Booktopia Direct Pty Ltd.
${altTag}
RRP ${fmtRetailPrice}
${fmtSalePrice}
BUY NOW