0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 54 matches in All Departments

Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Paperback): Bernard Suits Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Paperback)
Bernard Suits; Edited by Christopher C. Yorke, Francisco Javier Lopez Frias
R1,173 Discovery Miles 11 730 Ships in 9 - 15 working days

The sequel to Bernard Suits' classic book on the philosophy of games and sport The Grasshopper, published in full for the first time Suits is one of the most influential philosophers of all time in the philosophy of sport and games, a staple of all reading lists for courses on this topic Return of the Grasshopper includes clues intended by Suits to help the reader to unlock the riddles posed in the original The Grasshopper, so it's an essential companion to that classic book In Return of the Grasshopper, Suits goes further in his exploration of existential and political themes Includes introductory chapters that put Suits' life and work in context, examining the key themes he addresses in both The Grasshopper and Return of the Grasshopper

Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Hardcover): Bernard Suits Return of the Grasshopper - Games, Leisure and the Good Life in the Third Millennium (Hardcover)
Bernard Suits; Edited by Christopher C. Yorke, Francisco Javier Lopez Frias
R4,138 Discovery Miles 41 380 Ships in 12 - 17 working days

The sequel to Bernard Suits' classic book on the philosophy of games and sport The Grasshopper, published in full for the first time Suits is one of the most influential philosophers of all time in the philosophy of sport and games, a staple of all reading lists for courses on this topic Return of the Grasshopper includes clues intended by Suits to help the reader to unlock the riddles posed in the original The Grasshopper, so it's an essential companion to that classic book In Return of the Grasshopper, Suits goes further in his exploration of existential and political themes Includes introductory chapters that put Suits' life and work in context, examining the key themes he addresses in both The Grasshopper and Return of the Grasshopper

Location Privacy in Wireless Sensor Networks (Paperback): Ruben Rios, Javier Lopez, Jorge Cuellar Location Privacy in Wireless Sensor Networks (Paperback)
Ruben Rios, Javier Lopez, Jorge Cuellar
R1,435 Discovery Miles 14 350 Ships in 12 - 17 working days

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.

A Practical Guide to Equine Radiography (Hardcover): Gabriel Manso Diaz, Javier Lopez San Roman, Renate Weller A Practical Guide to Equine Radiography (Hardcover)
Gabriel Manso Diaz, Javier Lopez San Roman, Renate Weller
R2,208 Discovery Miles 22 080 Ships in 9 - 15 working days

A Practical Guide to Equine Radiography is designed to accompany the clinical veterinarian either within a hospital setting or out in the field. The book offers an informative step-by-step guide to obtaining high quality radiographs with a focus on image quality, accuracy, consistency and safety. General principles and equipment are covered before working through the anatomy of the horse with separate chapters devoted to each body region, providing a thorough and detailed picture of the skeletal structure of the horse, making the book an ideal reference for professionals involved with horse health and disease. Features provided in the book will guide the veterinarian through the stages of taking and interpreting normal radiographs and include: * Clinical indications of radiographic areas of interest in the horse * Equipment required * Preparation and setup guides, supported by photographs * Projections focusing on radiographic areas of interest, aided by photographs * x-rays presented with detailed labels, providing a close-up view of skeletal structures * Three dimensional images demonstrating normal anatomy A Practical Guide to Equine Radiography is an essential tool for equine practitioners, veterinary students and para-professionals.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R1,651 Discovery Miles 16 510 Ships in 10 - 15 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R3,495 Discovery Miles 34 950 Ships in 10 - 15 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Host-Pathogen Interactions - Methods and Protocols (Paperback, Softcover reprint of the original 1st ed. 2018): Carlos Medina,... Host-Pathogen Interactions - Methods and Protocols (Paperback, Softcover reprint of the original 1st ed. 2018)
Carlos Medina, Francisco Javier Lopez-Baena
R3,740 Discovery Miles 37 400 Ships in 10 - 15 working days

This detailed volume explores numerous multidisciplinary approaches employed to analyze the role of different molecules or strategies used by different guests to survive inside hosts. Divided into several sections, the book delves into animal-pathogen interaction, microbe-microbe interaction, as well as plant-pathogen interaction. Written for the highly successful Methods in Molecular Biology series, chapters include brief introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and practical, Host-Pathogen Interactions: Methods and Protocols provides many molecular and bioinformatics techniques currently in use at reputed laboratories in countries all around the world, vital for many kinds of host-pathogen interactions studies.

Host-Pathogen Interactions - Methods and Protocols (Hardcover, 1st ed. 2018): Carlos Medina, Francisco Javier Lopez-Baena Host-Pathogen Interactions - Methods and Protocols (Hardcover, 1st ed. 2018)
Carlos Medina, Francisco Javier Lopez-Baena
R3,609 Discovery Miles 36 090 Ships in 10 - 15 working days

This detailed volume explores numerous multidisciplinary approaches employed to analyze the role of different molecules or strategies used by different guests to survive inside hosts. Divided into several sections, the book delves into animal-pathogen interaction, microbe-microbe interaction, as well as plant-pathogen interaction. Written for the highly successful Methods in Molecular Biology series, chapters include brief introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and practical, Host-Pathogen Interactions: Methods and Protocols provides many molecular and bioinformatics techniques currently in use at reputed laboratories in countries all around the world, vital for many kinds of host-pathogen interactions studies.

Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015,... Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings (Paperback, 2015 ed.)
Javier Lopez, Yongdong Wu
R3,334 Discovery Miles 33 340 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.)
Alessandro Aldini, Javier Lopez, Fabio Martinelli
R2,405 Discovery Miles 24 050 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.

Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.): Maritta Heisel, Wouter... Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.)
Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli
R2,752 Discovery Miles 27 520 Ships in 10 - 15 working days

This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.

Critical Information Infrastructures Security - 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18,... Critical Information Infrastructures Security - 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-18, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Bernhard Hammerli, Nils Kalstad Svendsen, Javier Lopez
R2,278 Discovery Miles 22 780 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Critical Information Infrastructures Security, CRITIS 2012, held in Lillehammer, Norway, in September 2012. The 23 revised full papers were thoroughly reviewed and selected from 67 submissions. The papers are structured in the following topical sections: intrusion management; smart metering and grid, analysis and modeling; SCADA; cyber issues; CI analysis; CIP sectors; CI assessment; and threat modeling.

Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August... Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings (Paperback, 2013 ed.)
Steven Furnell, Costas Lambrinoudakis, Javier Lopez
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive environments.

Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback,... Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings (Paperback, 2013 ed.)
Javier Lopez, Xinyi Huang, Ravi Sandhu
R1,721 Discovery Miles 17 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).

Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings... Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings (Paperback, 2012 ed.)
Yang Xiang, Javier Lopez, C.-C.Jay Kuo, Wanlei Zhou
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), held in Melbourne, Australia, in December 2012. The 30 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 105 submissions. The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn systems, network and cloud security, wireless security, security protocols and models.

Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected... Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Paperback, 2011)
Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner
R1,934 Discovery Miles 19 340 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.

Secure and Trust Computing, Data Management, and Applications - 8th FIRA International Conference, STA 2011, Loutraki, Greece,... Secure and Trust Computing, Data Management, and Applications - 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I (Paperback, 2011)
James J (Jong Hyuk) Park, Javier Lopez, Sang-Soo Yeo, Taeshik Shon, David Taniar
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address various theories and practical applications of secure and trust computing and data management in future environments.

Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings... Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings (Paperback, Edition.)
Javier Lopez, Gene Tsudik
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Dimitris Gritzalis, Javier Lopez
R3,009 Discovery Miles 30 090 Ships in 10 - 15 working days

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.

Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 -... Critical Information Infrastructures Security - First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006 (Paperback, 2006 ed.)
Javier Lopez
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference. The papers address all security-related heterogeneous aspects of critical information infrastructures.

Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004.... Information and Communications Security - 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings (Paperback, 2004 ed.)
Javier Lopez, Eiji Okamoto
R3,239 Discovery Miles 32 390 Ships in 10 - 15 working days

This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), ' Spain,27-29 October 2004. The ?ve previous conferences were held in Beijing, Sydney, Xian, S- gapore and Huhehaote City, where we had an enthusiastic and well-attended event. The proceedings were released as volumes 1334, 1726, 2229, 2513 and 2836 of the LNCS series of Springer, respectively. During these last years the conference has placed equal emphasis on the theoretical and practical aspects of information and communications security and has established itself as a forum at which academic and industrial people meet and discuss emerging security challenges and solutions. We hope to uphold this tradition by offering you yet another successful meeting with a rich and interesting program. The responseto the Call for Paperswas overwhelming,245 papersubmissionswere received. Therefore, the paper selection process was very competitive and dif?cult - only 42 papers were accepted. The success of the conference depends on the quality of the program. Thus, we are indebted to our Program Committee members and the ext- nal refereesfor the great job they did. These proceedingscontainrevised versionsof the accepted papers.Revisions were not checked and the authorsbear full responsibilityfor the content of their papers.

Critical  Infrastructure Protection - Advances in Critical Infrastructure Protection: Information Infrastructure Models,... Critical Infrastructure Protection - Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense (Paperback, 2012 ed.)
Javier Lopez, Roberto Setola, Stephen Wolthusen
R2,048 Discovery Miles 20 480 Ships in 12 - 17 working days

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.

Collaborative Approaches for Cyber Security in Cyber-Physical Systems (Hardcover, 1st ed. 2023): Theo Dimitrakos, Javier Lopez,... Collaborative Approaches for Cyber Security in Cyber-Physical Systems (Hardcover, 1st ed. 2023)
Theo Dimitrakos, Javier Lopez, Fabio Martinelli
R4,256 Discovery Miles 42 560 Ships in 12 - 17 working days

This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general.

Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November... Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings (Paperback, 1st ed. 2019)
Swee-Huay Heng, Javier Lopez
R1,623 Discovery Miles 16 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019. The 21 full and 7 short papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized into the following topical sections: Cryptography I, System and Network Security, Security Protocol and Tool, Access Control and Authentication, Cryptography II, Data and User Privacy, Short Paper I, and Short Paper II.

Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31,... Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings (Paperback, 1st ed. 2017)
Javier Lopez, Simone Fischer-Hubner, Costas Lambrinoudakis
R2,306 Discovery Miles 23 060 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017. The 15 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in the following topical sections: Privacy in Mobile Environments; Transparence and Privacy Enhancing Technologies; Security Measures; Cloud - IoT Security and Privacy; Security Awareness and Social Engineering - Policy Languages.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Conforming Bandage
R3 Discovery Miles 30
Patrice Motsepe - An Appetite For…
Janet Smith Paperback R300 R240 Discovery Miles 2 400
Large 1680D Boys & Girls Backpack…
R507 Discovery Miles 5 070
American Gods - Season 2
Ricky Whittle, Ian McShane DVD  (1)
R55 Discovery Miles 550
Call The Midwife - Season 10
Jenny Agutter, Linda Bassett, … DVD R209 Discovery Miles 2 090
Sudocrem Skin & Baby Care Barrier Cream…
R128 Discovery Miles 1 280
Coty Vanilla Musk Cologne Spray (50ml…
R852 R508 Discovery Miles 5 080
3 Layer Fabric Face Mask (Blue)
R15 Discovery Miles 150
Knot-a-Bag Dispenser Refills
R111 R96 Discovery Miles 960
Soccer Waterbottle [Black]
R70 Discovery Miles 700

 

Partners