0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Best Sellers
Track My Order
Sign in
Register
Wishlist
Cart
0
GBP
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Computers
Movies
Music
All Products
\n
Books
Computers
Movies
Music
Computers
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Books
Best Sellers
Coming Soon
New Releases
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
GBP
Search
All Products
Books
Computers
Programming
Filters
Refine By
Category
Category
Software Development
(56)
General
(32)
Systems Design
(30)
Algorithms
(17)
Python
(4)
Java
(2)
CGI
(2)
Object Oriented
(2)
Compilers
(1)
XML
(1)
Sold By
Sold By
All Sellers
Fishpond
(118)
Age Range
Age Range
All Ranges
15+
(3)
All Ages
(3)
Country
Country
All Countries
United States
(39)
United Kingdom
(35)
Switzerland
(6)
Germany
(4)
Singapore
(3)
More...
Results for "Security Risk Management Books"
Security Risk Management Books
174 results
Filters
Refine By
Category
Category
Software Development
(56)
General
(32)
Systems Design
(30)
Algorithms
(17)
Python
(4)
Java
(2)
CGI
(2)
Object Oriented
(2)
Compilers
(1)
XML
(1)
Sold By
Sold By
All Sellers
Fishpond
(118)
Age Range
Age Range
All Ranges
15+
(3)
All Ages
(3)
Country
Country
All Countries
United States
(39)
United Kingdom
(35)
Switzerland
(6)
Germany
(4)
Singapore
(3)
More...
174 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
Penetration Tester's Open Source Toolkit 4e
By
Faircloth, Jeremy
£42.96
Advanced Persistent Security (A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies)
By
Winkler, Ira
,
Treu Gomes, Araceli (Intelligence and Investigations Subject Man
Advanced Persistent Security (A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies)
By
Winkler, Ira
,
Treu Gomes, Araceli (Intelligence and Investigations Subject Man
£34.15
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
£102
Elsewhere
£130.00
Save £28.00 (22%)
Secure and Resilient Software (Requirements, Test Cases, and Testing Methods [With CDROM])
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
,
Raghavan, Lakshmikanth
Secure and Resilient Software (Requirements, Test Cases, and Testing Methods [With CDROM])
By
Merkow, Mark S. (Technical Security Strategy, Scottsdale, Arizon
,
Raghavan, Lakshmikanth
£71.30
Elsewhere
£78.99
Save £7.69 (10%)
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
Core Software Security (Security at the Source)
By
Ransome, James (Senior Director, Product Security, McAfee - An I
,
Misra, Anmol
£44.54
Elsewhere
£46.99
Save £2.45 (5%)
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
£54.70
Essential PHP Security
By
Shiflett, Chris
Essential PHP Security
By
Shiflett, Chris
£18.16
Elsewhere
£23.99
Save £5.83 (24%)
184
Security for Service Oriented Architectures
By
Walter Williams
Security for Service Oriented Architectures
By
Walter Williams
£158
Elsewhere
£175.00
Save £17.00 (10%)
Security for Service Oriented Architectures
By
Williams, Walter
Security for Service Oriented Architectures
By
Williams, Walter
£42.29
Elsewhere
£61.99
Save £19.70 (32%)
1
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
Android Security (Attacks and Defenses)
By
Misra, Anmol
,
Dubey, Abhishek
£44.77
Elsewhere
£60.99
Save £16.22 (27%)
Practical Information Security Management (A Complete Guide to Planning and Implementation)
By
Campbell, Tony
Practical Information Security Management (A Complete Guide to Planning and Implementation)
By
Campbell, Tony
£56.36
Elsewhere
£64.99
Save £8.63 (13%)
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev, MBBS, MS
,
Raees Ahmad Khan
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev, MBBS, MS
,
Raees Ahmad Khan
£97.97
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev
,
Raees Ahmad Khan
Software Security (Concepts & Practices)
By
Ahmad Khan, Suhel
,
Kumar, Rajeev
,
Raees Ahmad Khan
£44.52
Water Supply Systems Security (Professional S.)
By
Mays, Larry W.
Water Supply Systems Security (Professional S.)
By
Mays, Larry W.
£171
Creating an Information Security Program from Scratch
By
Williams, Walter
Creating an Information Security Program from Scratch
By
Williams, Walter
£46.68
Elsewhere
£49.99
Save £3.31 (7%)
Practical Unix & Internet Security 3e
By
Garfinkel, Simson
,
Spafford, Gene
,
Alan Schwartz
Practical Unix & Internet Security 3e
By
Garfinkel, Simson
,
Spafford, Gene
,
Alan Schwartz
£31.52
Elsewhere
£43.99
Save £12.47 (28%)
219
Next-Generation Enterprise Security and Governance (Security, Audit and Leadership Series)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
Next-Generation Enterprise Security and Governance (Security, Audit and Leadership Series)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
£43.55
Williams, W (Creating an Information Security Program from S)
By
Walter Williams
Williams, W (Creating an Information Security Program from S)
By
Walter Williams
£98.47
Elsewhere
£135.00
Save £36.53 (27%)
Next-Generation Enterprise Security and Governance (Internal Audit and IT Audit)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
Next-Generation Enterprise Security and Governance (Internal Audit and IT Audit)
By
Mohiuddin Ahmed
,
Nour Moustafa
,
Abu Barkat
,
Paul Haskell-Dowland
£75.38
Elsewhere
£86.00
Save £10.62 (12%)
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Christina Braz
,
Ahmed Seffah
,
Bilal Naqvi
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Christina Braz
,
Ahmed Seffah
,
Bilal Naqvi
£39.15
Elsewhere
£44.99
Save £5.84 (13%)
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Braz, Christina
,
Seffah, Ahmed
,
Bilal Naqvi
Integrating a Usable Security Protocol Into User Authentication Services Design Process
By
Braz, Christina
,
Seffah, Ahmed
,
Bilal Naqvi
£91.07
Elsewhere
£105.00
Save £13.93 (13%)
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
Advanced API Security (Oauth 2.0 and Beyond)
By
Siriwardena, Prabath
£31.08
Elsewhere
£39.99
Save £8.91 (22%)
Considerations on the AI Endgame (Ethics, Risks and Computational Frameworks (Chapman & Hall/CRC Artificial Intelligence and Robotics Series))
By
Soenke Ziesche
,
Yampolskiy, Roman V.
Considerations on the AI Endgame (Ethics, Risks and Computational Frameworks (Chapman & Hall/CRC Artificial Intelligence and Robotics Series))
By
Soenke Ziesche
,
Yampolskiy, Roman V.
£28
Elsewhere
£29.99
Save £1.99 (7%)
1
2
3
4
5
6
7
8
Next Page
1
2
3
4
5
6
7
8
Next Page
We use essential and some optional cookies to provide you the best shopping experience. Visit our
cookies policy page
for more information.
Accept all cookies
Accept only essential cookies