Winner Of An Outstanding Academic Title Award From Choice Magazinemost Available Cryptology Books Primarily Focus On Either Mathematics Or History. Breaking This Mold, Secret History:...
Although many software books highlight open problems in secure software development, few provide easily actionable, groundlevel solutions. Breaking the mold, Secure and Resilient Software Development...
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Developmentleaves the boring details of software...
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Developmentleaves the boring details of software...
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence...
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence...
Today's managers encounter tremendous resistance in getting others to buyin to change. The ongoing rounds of downsizing and upheaval have taken their toll, leaving a...
Today's managers encounter tremendous resistance in getting others to buyin to change. The ongoing rounds of downsizing and upheaval have taken their toll, leaving a...
Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field.It includes chapters covering emerging security trends, cyber...
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies stateoftheart approaches...
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities...
Security for Wireless Sensor Networks using IdentityBased Cryptography introduces identitybased cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing...
This comprehensive handbook serves as a professional reference and practitioners guide to todays most complete and concise view of private cloud security. It explores practical...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":false,"requiresBillingAgreement":false,"merchantId":"L873BZSC9NMQS","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AbasDhzlU0HbpiStJiN1KRJ_cNJJ7xYBip7JJoMO0GQpLi8ePNgdbLXkC7_KMeyTg8tnAKW4WKrh9qmf\u0026merchant-id=L873BZSC9NMQS\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="0239910cc3cfe81991c00beda8049e29" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true" data-consent-type="subscription"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
For MAP (Minimum Advertised Price) violations, please contact: map@ergode.com
For Intellectual Property (IP) or Trademark concerns, please contact: ip@ergode.com
⚠️ California Proposition 65 Warning: Some products sold on this website may expose you to chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm. For more information, visit www.P65Warnings.ca.gov.
Winner Of An Outstanding Academic Title Award From Choice Magazinemost Available Cryptology Books Primarily Focus On Either Mathematics Or History. Breaking This Mold, Secret History:...
Although many software books highlight open problems in secure software development, few provide easily actionable, groundlevel solutions. Breaking the mold, Secure and Resilient Software Development...
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Developmentleaves the boring details of software...
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Developmentleaves the boring details of software...
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence...
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence...
Today's managers encounter tremendous resistance in getting others to buyin to change. The ongoing rounds of downsizing and upheaval have taken their toll, leaving a...
Today's managers encounter tremendous resistance in getting others to buyin to change. The ongoing rounds of downsizing and upheaval have taken their toll, leaving a...
Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field.It includes chapters covering emerging security trends, cyber...
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies stateoftheart approaches...
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities...
Security for Wireless Sensor Networks using IdentityBased Cryptography introduces identitybased cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing...
This comprehensive handbook serves as a professional reference and practitioners guide to todays most complete and concise view of private cloud security. It explores practical...
Sale price$78.04Regular price$111.49
Quantity
Add to cart
Choosing a selection results in a full page refresh.