Skip to main content Site map

Reading lists: Principles of Cybersecurity and Cyber Resilience - CETM32


Reading lists: Principles of Cybersecurity and Cyber Resilience - CETM32

Reading list titles for this module

These items are only part of your institution's official Reading Lists - you can use your funds to purchase these. This is not the extensive list and many resources can be found via your programme and course reading lists.

There are eBook alternatives for many of the key titles - you can switch to these at the 'basket'. Benefit from instant access, no delivery and saving money. Read our eBook Guide.

 
Product name
Price
Rating
Buy
Cryptography Engineering: Design Principles and Practical Applications
CRYPTOGRAPHY ENGINEERING: DESIGN PRINCIPLES AND PRACTICAL APPLICATIONS

Ferguson, Niels; Schneier, Bruce (Counterpane Internet...

£45.00
£45.00
Recommended

Java Security 2e
JAVA SECURITY 2E

Oaks, Scott

£43.99
Recommended
Secure Cloud Computing
SECURE CLOUD COMPUTING

Jajodia, Sushil; Kant, Krishna; Samarati,...

£89.99
£89.50
Recommended

Security in Computing
SECURITY IN COMPUTING

Pfleeger, Charles; Pfleeger, Shari; Margulies,...

£95.24
£76.19
Recommended

Software Engineering, Global Edition (PDF eBook)
£43.99
Recommended

University of Sunderland logo