We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£107.98
Springer Managing Cyber Threats: Issues, Approaches, and Challenges: 5 (Massive Computing, 5)
Price data checked 1 day ago
We'll watch every seller, every day. One email when your price arrives.
This is the most expensive it has ever been. Walk away.
£108 today · previous high £108 · all-time low £107
NEW HERE?
Amazon shows you one price. We show you all of them.
Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.
WHAT'S ON THIS PAGE
when this has been cheap or pricey
where the price is heading next
all-time high & low, recent range
name your number, we'll email you
Price History & Forecast
Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.
Last 90 days • 90 data points
Price Distribution
Price distribution over 90 days • 2 price levels
Price Analysis
Most common price: £107 (73 days, 81.1%)
Price range: £107 - £108
Price levels: 2 different prices over 90 days
Description
Product Specifications
- Brand
- Springer
- Format
- paperback
- ASIN
- 1441937056
- Domain
- Amazon UK
- Release Date
- 06 December 2010
- Listed Since
- 06 July 2010
Barcode
No barcode data available
Similar Products You Might Like
Practical Internet Security
Springer
Collaborative Approaches for Cyber Security in Cyber-Physical Systems (Advanced Sciences and Technologies for Security Applications)
Springer
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats: 54 (Advances in Information Security, 54)
Springer
Network Security
Springer
Research Techniques for Computer Science, Information Systems, Cybersecurity and Applications of Artificial Intelligence
Springer
Artificial Intelligence in Cyber Security: Impact and Implications: Security Challenges, Technical and Ethical Issues, Forensic Investigative ... and Technologies for Security Applications)
Springer
Guide to Computer Network Security (Texts in Computer Science)
Springer
Cyberterrorism: The Legal and Enforcement Issues
Scientific Publishing
Managing Supply Chain Risk and Vulnerability: Tools and Methods for Supply Chain Decision Makers
Springer
Security of e-Systems and Computer Networks
Cambridge University Press
Advances in Human Factors in Cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16–20, 2020, USA: 1219 (Advances in Intelligent Systems and Computing, 1219)
Springer
International Security Management: New Solutions to Complexity (Advanced Sciences and Technologies for Security Applications)
Springer
Critical Information Infrastructures: Resilience and Protection
Springer
Advances in Engineering and Information Science Toward Smart City and Beyond: 5 (Engineering Cyber-Physical Systems and Critical Infrastructures, 5)
Springer
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity ... in Safety, Risk, Reliability and Quality, 15)
Springer
Modern Approaches in IoT and Machine Learning for Cyber Security: Latest Trends in AI (Internet of Things)
Springer
Securing Emerging Wireless Systems: Lower-layer Approaches
Springer
Cyber Crisis Management: Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation
Springer
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
Springer
Spyware and Adware: 50 (Advances in Information Security, 50)
Springer
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, ... in Intelligent Systems and Computing, 960)
Springer
Understanding Cybersecurity Management in Healthcare: Challenges, Strategies and Trends (Progress in IS)
Springer
Intrusion Detection and Correlation: Challenges and Solutions: 14 (Advances in Information Security, 14)
Springer
Cybersicherheit in kritischen Infrastrukturen: Ein spieltheoretischer Zugang
Springer