We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£66.63
Information Age Publishing Biometric and Auditing Issues Addressed in a Throughput Model (HC)
Price data checked 7 days ago
Price History & Forecast
Last 84 days • 84 data points (No recent data available)
Price Distribution
Price distribution over 84 days • 1 price levels
Price Analysis
Most common price: £67 (84 days, 100.0%)
Price range: £67 - £67
Price levels: 1 different prices over 84 days
Description
Product Specifications
- Format
- hardcover
- ASIN
- 1617356549
- Domain
- Amazon UK
- Release Date
- 15 November 2011
- Listed Since
- 28 November 2011
Barcode
No barcode data available
Similar Products You Might Like
Second Generation Biometrics: The Ethical, Legal and Social Context: 11 (The International Library of Ethics, Law and Technology, 11)
Springer
Advanced Methods for Human Biometrics: 40 (Smart Sensors, Measurement and Instrumentation, 40)
Springer
Biometrics, Crime and Security (Law, Science and Society)
Routledge
Information Security: Foundations, technologies and applications
Institution of Engineering & Technology
ADVANCED TOPICS IN BIOMETRICS
World Scientific Publishing Company
A Practical Guide to Security Assessments
Routledge
Foundations and Opportunities of Biometrics: An Introduction to Technology, Applications, and Responsibilities
Apress
ISO 27001 INTERNAL AUDITS & DATA PROTECTION: STRENGTHENING COMPLIANCE & SECURITY: A Practical Guide to Conducting Internal Audits and Safeguarding Sensitive Data: 2 (ISO 27001:2022)
Biometrics, Surveillance and the Law: Societies of Restricted Access, Discipline and Control (Routledge Research in the Law of Emerging Technologies)
Routledge
Information Assurance: Managing Organizational IT Security Risks
Butterworth-Heinemann
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)
CRC Press
ISO 27001: Information Security Management System requirements Lead Auditor Mastery for Business Success "Simplified ISO 27001: A Business Leader's Guide to Success"
The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age
Butterworth-Heinemann
Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management (Chapman & Hall/CRC Computational Intelligence and Its Applications)
CRC Press
Invading the Private: State Accountability and New Investigative Methods in Europe (Routledge Revivals)
Routledge
The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)
CRC Press
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)
Springer
Securing AI Using Zero Trust Principles (Networking Technology: Security)
Cisco
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Advances in Digital Crime, Forensics, and Cyber Terrorism (Adcfct))
Information Science Reference
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls
Apress
Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)
Springer
Strategic Information Security
CRC Press
Currency Transaction Reports: What Every Bank Should Know
CREATESPACE
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities: 972 (Studies in Computational Intelligence, 972)
Springer