Books

Filter
Set Descending Direction

Items 217-235 of 620

per page
  1. Adversarial Machine Learning object(Magento\Catalog\Model\Product\Interceptor)#13813 (27) { ["entity_id"]=> string(5) "58414" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783030997724" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:51:48" ["updated_at"]=> string(19) "2025-07-24 11:51:48" ["price"]=> string(10) "149.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "149.990000" ["minimal_price"]=> string(10) "149.990000" ["min_price"]=> string(10) "149.990000" ["max_price"]=> string(10) "149.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(28) "Adversarial Machine Learning" ["image_label"]=> string(28) "Adversarial Machine Learning" ["url_key"]=> string(28) "adversarial-machine-learning" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "adversarial-machine-learning.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A critical challenge in deep learning is the vulnerability of...

    Rating:
    0%
    £149.99
    Add to Wish List
  2. Cryptography for Developers object(Magento\Catalog\Model\Product\Interceptor)#13792 (33) { ["entity_id"]=> string(5) "59958" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080503455" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:21:53" ["updated_at"]=> string(19) "2025-07-24 12:21:53" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(27) "Cryptography for Developers" ["image"]=> string(22) "/9/7/9780080503455.jpg" ["small_image"]=> string(22) "/9/7/9780080503455.jpg" ["thumbnail"]=> string(22) "/9/7/9780080503455.jpg" ["image_label"]=> string(27) "Cryptography for Developers" ["small_image_label"]=> string(27) "Cryptography for Developers" ["thumbnail_label"]=> string(27) "Cryptography for Developers" ["url_key"]=> string(27) "cryptography-for-developers" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to i" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(32) "cryptography-for-developers.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only guide for software developers who must learn and...

    Rating:
    0%
    £38.99
    Add to Wish List
  3. Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security object(Magento\Catalog\Model\Product\Interceptor)#14323 (33) { ["entity_id"]=> string(5) "59684" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080505893" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:14:58" ["updated_at"]=> string(19) "2025-07-24 12:14:58" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["image"]=> string(22) "/9/7/9780080505893.jpg" ["small_image"]=> string(22) "/9/7/9780080505893.jpg" ["thumbnail"]=> string(22) "/9/7/9780080505893.jpg" ["image_label"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["small_image_label"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["thumbnail_label"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["url_key"]=> string(84) "essential-computer-security-everyone-s-guide-to-email-internet-and-wireless-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(89) "essential-computer-security-everyone-s-guide-to-email-internet-and-wireless-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Essential Computer Security provides the vast home user and small...

    Rating:
    0%
    £19.99
    Add to Wish List
  4. Wireshark & Ethereal Network Protocol Analyzer Toolkit object(Magento\Catalog\Model\Product\Interceptor)#13841 (33) { ["entity_id"]=> string(5) "59702" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080506012" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:15:25" ["updated_at"]=> string(19) "2025-07-24 12:15:25" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(54) "Wireshark & Ethereal Network Protocol Analyzer Toolkit" ["image"]=> string(22) "/9/7/9780080506012.jpg" ["small_image"]=> string(22) "/9/7/9780080506012.jpg" ["thumbnail"]=> string(22) "/9/7/9780080506012.jpg" ["image_label"]=> string(54) "Wireshark & Ethereal Network Protocol Analyzer Toolkit" ["small_image_label"]=> string(54) "Wireshark & Ethereal Network Protocol Analyzer Toolkit" ["thumbnail_label"]=> string(54) "Wireshark & Ethereal Network Protocol Analyzer Toolkit" ["url_key"]=> string(52) "wireshark-ethereal-network-protocol-analyzer-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress' best-selling book Ethereal Packet Sniffing.Wireshark & Ethereal Network Protocol Analy" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(57) "wireshark-ethereal-network-protocol-analyzer-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Ethereal is the #2 most popular open source security tool...

    Rating:
    0%
    £31.99
    Add to Wish List
  5. Trojans, Worms, and Spyware object(Magento\Catalog\Model\Product\Interceptor)#13831 (33) { ["entity_id"]=> string(5) "61372" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080519685" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:54:20" ["updated_at"]=> string(19) "2025-07-24 12:54:20" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(27) "Trojans, Worms, and Spyware" ["image"]=> string(22) "/9/7/9780080519685.jpg" ["small_image"]=> string(22) "/9/7/9780080519685.jpg" ["thumbnail"]=> string(22) "/9/7/9780080519685.jpg" ["image_label"]=> string(27) "Trojans, Worms, and Spyware" ["small_image_label"]=> string(27) "Trojans, Worms, and Spyware" ["thumbnail_label"]=> string(27) "Trojans, Worms, and Spyware" ["url_key"]=> string(25) "trojans-worms-and-spyware" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems securit" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "trojans-worms-and-spyware.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Trojans, Worms, and Spyware provides practical, easy to understand, and...

    Rating:
    0%
    £36.99
    Add to Wish List
  6. Artificial Intelligence and Information Technologies object(Magento\Catalog\Model\Product\Interceptor)#13805 (33) { ["entity_id"]=> string(5) "66021" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781040116012" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:37:16" ["updated_at"]=> string(19) "2025-07-24 14:37:16" ["price"]=> string(10) "270.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "270.000000" ["minimal_price"]=> string(10) "270.000000" ["min_price"]=> string(10) "270.000000" ["max_price"]=> string(10) "270.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(52) "Artificial Intelligence and Information Technologies" ["image"]=> string(22) "/9/7/9781040116012.jpg" ["small_image"]=> string(22) "/9/7/9781040116012.jpg" ["thumbnail"]=> string(22) "/9/7/9781040116012.jpg" ["image_label"]=> string(52) "Artificial Intelligence and Information Technologies" ["small_image_label"]=> string(52) "Artificial Intelligence and Information Technologies" ["thumbnail_label"]=> string(52) "Artificial Intelligence and Information Technologies" ["url_key"]=> string(52) "artificial-intelligence-and-information-technologies" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book contains the proceedings of a non-profit conference with the objective of providing a platform for academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their rese" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(57) "artificial-intelligence-and-information-technologies.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book contains the proceedings of a non-profit conference with...

    Rating:
    0%
    £270.00
    Add to Wish List
  7. Microsoft Windows Server 2008 R2 Administrator's Reference object(Magento\Catalog\Model\Product\Interceptor)#13810 (27) { ["entity_id"]=> string(5) "64353" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781597495790" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:00:28" ["updated_at"]=> string(19) "2025-07-24 14:00:28" ["price"]=> string(9) "27.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "27.990000" ["minimal_price"]=> string(9) "27.990000" ["min_price"]=> string(9) "27.990000" ["max_price"]=> string(9) "27.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(58) "Microsoft Windows Server 2008 R2 Administrator's Reference" ["image_label"]=> string(58) "Microsoft Windows Server 2008 R2 Administrator's Reference" ["url_key"]=> string(58) "microsoft-windows-server-2008-r2-administrator-s-reference" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the availab" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(63) "microsoft-windows-server-2008-r2-administrator-s-reference.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces...

    Rating:
    0%
    £27.99
    Add to Wish List
  8. History of Information Security object(Magento\Catalog\Model\Product\Interceptor)#13830 (33) { ["entity_id"]=> string(5) "66467" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080550589" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:47:00" ["updated_at"]=> string(19) "2025-07-24 14:47:00" ["price"]=> string(10) "165.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "165.000000" ["minimal_price"]=> string(10) "165.000000" ["min_price"]=> string(10) "165.000000" ["max_price"]=> string(10) "165.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(31) "History of Information Security" ["image"]=> string(22) "/9/7/9780080550589.jpg" ["small_image"]=> string(22) "/9/7/9780080550589.jpg" ["thumbnail"]=> string(22) "/9/7/9780080550589.jpg" ["image_label"]=> string(31) "History of Information Security" ["small_image_label"]=> string(31) "History of Information Security" ["thumbnail_label"]=> string(31) "History of Information Security" ["url_key"]=> string(31) "history-of-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "history-of-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Information Security is usually achieved through a mix of technical,...

    Rating:
    0%
    £165.00
    Add to Wish List
  9. How to Cheat at Microsoft Vista Administration object(Magento\Catalog\Model\Product\Interceptor)#13829 (33) { ["entity_id"]=> string(5) "66869" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553559" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:55:52" ["updated_at"]=> string(19) "2025-07-24 14:55:52" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["image"]=> string(22) "/9/7/9780080553559.jpg" ["small_image"]=> string(22) "/9/7/9780080553559.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553559.jpg" ["image_label"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["small_image_label"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["thumbnail_label"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["url_key"]=> string(46) "how-to-cheat-at-microsoft-vista-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utili" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(51) "how-to-cheat-at-microsoft-vista-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista...

    Rating:
    0%
    £31.99
    Add to Wish List
  10. Cyber Security Using Modern Technologies object(Magento\Catalog\Model\Product\Interceptor)#13828 (33) { ["entity_id"]=> string(5) "66487" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781000908060" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:47:27" ["updated_at"]=> string(19) "2025-07-24 14:47:27" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(40) "Cyber Security Using Modern Technologies" ["image"]=> string(22) "/9/7/9781000908060.jpg" ["small_image"]=> string(22) "/9/7/9781000908060.jpg" ["thumbnail"]=> string(22) "/9/7/9781000908060.jpg" ["image_label"]=> string(40) "Cyber Security Using Modern Technologies" ["small_image_label"]=> string(40) "Cyber Security Using Modern Technologies" ["thumbnail_label"]=> string(40) "Cyber Security Using Modern Technologies" ["url_key"]=> string(40) "cyber-security-using-modern-technologies" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "cyber-security-using-modern-technologies.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The main objective of this book is to introduce cyber...

    Rating:
    0%
    £44.99
    Add to Wish List
  11. AI, Machine Learning and Deep Learning object(Magento\Catalog\Model\Product\Interceptor)#13827 (33) { ["entity_id"]=> string(5) "67261" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781000878875" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:00" ["updated_at"]=> string(19) "2025-07-24 15:04:00" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(38) "AI, Machine Learning and Deep Learning" ["image"]=> string(22) "/9/7/9781000878875.jpg" ["small_image"]=> string(22) "/9/7/9781000878875.jpg" ["thumbnail"]=> string(22) "/9/7/9781000878875.jpg" ["image_label"]=> string(38) "AI, Machine Learning and Deep Learning" ["small_image_label"]=> string(38) "AI, Machine Learning and Deep Learning" ["thumbnail_label"]=> string(38) "AI, Machine Learning and Deep Learning" ["url_key"]=> string(37) "ai-machine-learning-and-deep-learning" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL alg" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "ai-machine-learning-and-deep-learning.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL)...

    Rating:
    0%
    £44.99
    Add to Wish List
  12. Microsoft Vista for IT Security Professionals object(Magento\Catalog\Model\Product\Interceptor)#13826 (33) { ["entity_id"]=> string(5) "67334" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556147" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:05:55" ["updated_at"]=> string(19) "2025-07-24 15:05:55" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(45) "Microsoft Vista for IT Security Professionals" ["image"]=> string(22) "/9/7/9780080556147.jpg" ["small_image"]=> string(22) "/9/7/9780080556147.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556147.jpg" ["image_label"]=> string(45) "Microsoft Vista for IT Security Professionals" ["small_image_label"]=> string(45) "Microsoft Vista for IT Security Professionals" ["thumbnail_label"]=> string(45) "Microsoft Vista for IT Security Professionals" ["url_key"]=> string(45) "microsoft-vista-for-it-security-professionals" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn h" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "microsoft-vista-for-it-security-professionals.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft Vista for IT Security Professionals is designed for the...

    Rating:
    0%
    £38.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. PCI Compliance object(Magento\Catalog\Model\Product\Interceptor)#13825 (33) { ["entity_id"]=> string(5) "67370" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556383" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:06:40" ["updated_at"]=> string(19) "2025-07-24 15:06:40" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(14) "PCI Compliance" ["image"]=> string(22) "/9/7/9780080556383.jpg" ["small_image"]=> string(22) "/9/7/9780080556383.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556383.jpg" ["image_label"]=> string(14) "PCI Compliance" ["small_image_label"]=> string(14) "PCI Compliance" ["thumbnail_label"]=> string(14) "PCI Compliance" ["url_key"]=> string(14) "pci-compliance" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more prof" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(19) "pci-compliance.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Identity theft has been steadily rising in recent years, and...

    Rating:
    0%
    £39.99
    Add to Wish List
  15. Best Damn Server Virtualization Book Period object(Magento\Catalog\Model\Product\Interceptor)#13824 (33) { ["entity_id"]=> string(5) "67397" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556659" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:07:21" ["updated_at"]=> string(19) "2025-07-24 15:07:21" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(43) "Best Damn Server Virtualization Book Period" ["image"]=> string(22) "/9/7/9780080556659.jpg" ["small_image"]=> string(22) "/9/7/9780080556659.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556659.jpg" ["image_label"]=> string(43) "Best Damn Server Virtualization Book Period" ["small_image_label"]=> string(43) "Best Damn Server Virtualization Book Period" ["thumbnail_label"]=> string(43) "Best Damn Server Virtualization Book Period" ["url_key"]=> string(43) "best-damn-server-virtualization-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those app" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "best-damn-server-virtualization-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Server Sprawl and escalating IT costs have managers and system...

    Rating:
    0%
    £38.99
    Add to Wish List
  16. How to Cheat at Configuring VmWare ESX Server object(Magento\Catalog\Model\Product\Interceptor)#13823 (33) { ["entity_id"]=> string(5) "67164" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555355" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:02:17" ["updated_at"]=> string(19) "2025-07-24 15:02:17" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(45) "How to Cheat at Configuring VmWare ESX Server" ["image"]=> string(22) "/9/7/9780080555355.jpg" ["small_image"]=> string(22) "/9/7/9780080555355.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555355.jpg" ["image_label"]=> string(45) "How to Cheat at Configuring VmWare ESX Server" ["small_image_label"]=> string(45) "How to Cheat at Configuring VmWare ESX Server" ["thumbnail_label"]=> string(45) "How to Cheat at Configuring VmWare ESX Server" ["url_key"]=> string(45) "how-to-cheat-at-configuring-vmware-esx-server" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syn" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "how-to-cheat-at-configuring-vmware-esx-server.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A virtual evolution in IT shops large and small has...

    Rating:
    0%
    £31.99
    Add to Wish List
  17. SpringerBriefs in Electrical and Computer Engineering object(Magento\Catalog\Model\Product\Interceptor)#13822 (27) { ["entity_id"]=> string(5) "67521" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783319758688" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:10:03" ["updated_at"]=> string(19) "2025-07-24 15:10:03" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(53) "SpringerBriefs in Electrical and Computer Engineering" ["image_label"]=> string(53) "SpringerBriefs in Electrical and Computer Engineering" ["url_key"]=> string(53) "springerbriefs-in-electrical-and-computer-engineering" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detaile" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(58) "springerbriefs-in-electrical-and-computer-engineering.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This SpringerBrief provides a comprehensive study of the unique security threats...

    Rating:
    0%
    £44.99
    Add to Wish List
  18. Understand, Manage, and Measure Cyber Risk(R) object(Magento\Catalog\Model\Product\Interceptor)#13821 (27) { ["entity_id"]=> string(5) "55450" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484293195" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:57:14" ["updated_at"]=> string(19) "2025-07-24 08:57:14" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(45) "Understand, Manage, and Measure Cyber Risk(R)" ["image_label"]=> string(45) "Understand, Manage, and Measure Cyber Risk(R)" ["url_key"]=> string(42) "understand-manage-and-measure-cyber-risk-r" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "When it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid.A plethora of cybersecurity mana" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(47) "understand-manage-and-measure-cyber-risk-r.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    When it comes to managing cybersecurity in an organization, most...

    Rating:
    0%
    £54.99
    Add to Wish List
  19. Synthesis Lectures on Information Security, Privacy, and Trust object(Magento\Catalog\Model\Product\Interceptor)#13820 (27) { ["entity_id"]=> string(5) "60432" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031597244" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:32:48" ["updated_at"]=> string(19) "2025-07-24 12:32:48" ["price"]=> string(9) "69.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "69.990000" ["minimal_price"]=> string(9) "69.990000" ["min_price"]=> string(9) "69.990000" ["max_price"]=> string(9) "69.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(62) "Synthesis Lectures on Information Security, Privacy, and Trust" ["image_label"]=> string(62) "Synthesis Lectures on Information Security, Privacy, and Trust" ["url_key"]=> string(60) "synthesis-lectures-on-information-security-privacy-and-trust" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems. It gives readers unique and e" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(65) "synthesis-lectures-on-information-security-privacy-and-trust.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book, authored by some of the pioneers in the...

    Rating:
    0%
    £69.99
    Add to Wish List
  20. Screening by International Aid Organizations Operating in the Global South object(Magento\Catalog\Model\Product\Interceptor)#13819 (27) { ["entity_id"]=> string(5) "55717" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031541650" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:02:25" ["updated_at"]=> string(19) "2025-07-24 09:02:25" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(74) "Screening by International Aid Organizations Operating in the Global South" ["image_label"]=> string(74) "Screening by International Aid Organizations Operating in the Global South" ["url_key"]=> string(74) "screening-by-international-aid-organizations-operating-in-the-global-south" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Aid organizations usually embrace the idea of digitalization, both in terms of using diverse technologies and processing data digitally for improving their services, making their operations more efficient and even mitigating various risks. While digital f" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(79) "screening-by-international-aid-organizations-operating-in-the-global-south.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Aid organizations usually embrace the idea of digitalization, both in...

    Rating:
    0%
    £32.99
    Add to Wish List
Filter
Set Descending Direction

Items 217-235 of 620

per page