Condition: New. pp. 124.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 124.
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 124.
Condition: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
Condition: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Condition: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
Condition: New. pp. 488.
Condition: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed.
Condition: New. pp. 488.
Condition: New. pp. 488.
Seller: UK BOOKS STORE, London, LONDO, United Kingdom
US$ 75.15
Quantity: Over 20 available
Add to basketCondition: New. Brand New ! Fast Delivery "International Edition " and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 4-6 Working days .and we do have flat rate for up to 2LB. Extra shipping charges will be requested This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability.
Seller: UK BOOKS STORE, London, LONDO, United Kingdom
US$ 83.05
Quantity: 19 available
Add to basketCondition: New. Brand New ! Fast Delivery "International Edition " and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 4-6 Working days .and we do have flat rate for up to 2LB. Extra shipping charges will be requested This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability.
Condition: New.
Condition: As New. Unread book in perfect condition.
US$ 134.20
Quantity: 1 available
Add to basketPaperback. Condition: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 152.89
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 152.89
Quantity: Over 20 available
Add to basketCondition: New. In.
US$ 152.89
Quantity: Over 20 available
Add to basketCondition: New. In.
US$ 152.89
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 152.89
Quantity: Over 20 available
Add to basketCondition: New. In.
US$ 152.88
Quantity: Over 20 available
Add to basketCondition: New.
Condition: As New. Unread book in perfect condition.
US$ 171.03
Quantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Condition: New.
Condition: New.
US$ 185.93
Quantity: Over 20 available
Add to basketHardback. Condition: New. This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world. The chapters discuss different research frontiers in computer security with algorithms and implementation details for use in the real world. Researchers and practitioners in areas such as statistics, pattern recognition, machine learning, artificial intelligence, deep learning, data mining, data analytics and visualization are contributing to the field of computer security. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on computer security threats and its defensive measures.