Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Practical Cryptography by Niels Ferguson
RRP: $73.40$49.20Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead... -
Cyberstrike: DC by James Barrington
RRP: $18.88$13.36Ben Morgan is back, and the stakes have never been higher.In Iraq, a surprise attack decimates the IS leadership. Revenge is sworn. A terrorist mastermind conceives a double-strike against America and Britain.Ten years later, cyberattacks hit both sides... -
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework by Jessey Bullock
RRP: $89.25$58.19Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network... -
Introduction to Cryptography with Mathematical Foundations and Computer Implementations by Alexander Stanoyevitch
RRP: $203.68$178.61From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present... -
An Introduction to Mathematical Cryptography by Jeffrey Hoffstein 9781493917105
RRP: $132.28$119.26This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the... -
Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty
RRP: $60.88$35.93Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought... -
Accumulo: Application Development, Table Design, and Best Practices by Michael Wall 9781449374181
RRP: $83.98$55.76Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google's BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and... -
Cybersecurity Blue Team Toolkit by Nadean H. Tanner 9781119552932
RRP: $69.30$45.40A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the... -
Random Number Generators-Principles and Practices: A Guide for Engineers and Programmers by David Johnston 9781501515132
RRP: $135.45$98.91Random Number Generators, Principles and Practices has been written for programmers, hardware engineers, and sophisticated hobbyists interested in understanding random numbers generators and gaining the tools necessary to work with random number... -
Crypto Dictionary by Jean-Philippe Aumasson
RRP: $50.38$33.12The go-to dictionary (and encyclopedia) for crypto novices and experts alike. It covers technical terms found in modern software analysis, such as 'block cipher,' while providing context for historical references like the 'crypto wars,' sharing amusing... -
Identity and Data Security for Web Development by Jonathan LeBlanc 9781491937013
RRP: $67.18$43.28Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a... -
Tribe of Hackers Security Leaders: Tribal Knowledge from the best in Cybersecurity Leadership by Marcus J. Carey
RRP: $39.88$26.78Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and... -
Practical Linux Forensics: A Guide for Digital Investigators by Bruce Nikkel
RRP: $119.68$68.04Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence... -
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks by Chris Peiris
RRP: $79.78$51.74Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated... -
Introduction to Coding Theory by Jurgen Bierbrauer 9781032477190
RRP: $92.38$80.72This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second... -
Mastering Corda: Building Distributed Applications with Corda by Jamiel Sheikh
RRP: $134.38$87.00Mastering Corda provides you with a consistent, linear, and paced path to learning Corda and building modern enterprise-grade decentralized applications. Using this book, anyone from a complete blockchain beginner to an experienced blockchain or... -
Secret Key Cryptography: Ciphers, from Simple to Unbreakable by Frank Rubin
RRP: $81.88$60.69Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781633439795Author Frank RubinFormat PaperbackPage Count 225Imprint Manning PublicationsPublisher Manning PublicationsWeight(grams) 187g -
Cryptography: Theory and Practice by Douglas Robert Stinson
RRP: $182.68$160.73Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography.The authors offer... -
Practical Mathematical Cryptography by Kristian Gjosteen
RRP: $178.48$155.09Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography. Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the... -
An Introduction to Number Theory with Cryptography by James Kraft 9781032476353
RRP: $92.38$80.72Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors... -
Foundations of Cryptography: Volume 2: Basic Applications by Oded Goldreich
$115.77Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous... -
The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology by John F. Dooley 9783031283178
RRP: $73.48$62.54In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June 1917, Herbert Yardley convinced the new head of the... -
x86 Software Reverse-Engineering, Cracking, and Counter-Measures by Stephanie Domas 9781394199884
RRP: $99.75$86.96A crystal-clear and practical blueprint to software disassembly x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and... -
Zero Trust Journey Across the Digital Estate by Binil A. Pillai
RRP: $94.48$82.49"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that shows us that our past approaches, while earnest in their efforts, have not stopped... -
Secret History: The Story of Cryptology by Craig P. Bauer
RRP: $163.78$144.69Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of... -
Boolean Functions for Cryptography and Coding Theory by Claude Carlet
$182.60Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles... -
Implementing Cryptography Using Python by Shannon Bray
RRP: $79.78$51.74Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need... -
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption by Craig Jarvis
RRP: $60.88$52.69The crypto wars have raged for half a century.In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned... -
An In-Depth Guide to Mobile Device Forensics by Chuck Easttom
RRP: $94.48$82.49Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile... -
Understanding Blockchain and Cryptocurrencies: A Primer for Implementing and Developing Blockchain Projects by Akira Summers
RRP: $102.88$89.59Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.You... -
Computational Number Theory by Abhijit Das
RRP: $220.50$191.65Developed from the author's popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning... -
Building Secure Cars: Assuring the Automotive Software Development Lifecycle by Dennis Kengo Oka
RRP: $226.70$196.92BUILDING SECURE CARS Explores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycleWhile increased connectivity and advanced software-based automotive systems provide... -
The Truth Machine: The Blockchain and the Future of Everything by Paul Vigna
RRP: $37.80$25.77Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781250304179Author Paul VignaFormat PaperbackPage Count 336Imprint Picador USAPublisher Picador USAWeight(grams) 272gDimensions(mm) 208mm * 135mm * 28mm -
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms by Christof Paar 9783662690062
RRP: $125.98$105.97Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.Heavily revised and updated, the long-awaited second edition of Understanding... -
A Cryptography Primer: Secrets and Promises by Philip N. Klein 9781107603455
$71.82Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from... -
The Birth of Meme Coins: From Dogecoin to PepeCash, a journey through the early days of memetic cryptocurrencies by Alexander C Blair 9780479847269
RRP: $23.08$16.59Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780479847269Author Alexander C BlairFormat PaperbackPage Count 90Imprint PN BooksPublisher PN BooksWeight(grams) 132g -
Blockchain Technology And Hacking: Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking Computers and Mobile Hacking by Isaac D Cody 9781548185442
RRP: $46.18$38.37Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781548185442Author Isaac D CodyFormat PaperbackPage Count 224Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent Publishing... -
Cryptography & Open Source by Solis Tech 9781523662401
RRP: $20.75$17.09Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781523662401Author Solis TechFormat PaperbackPage Count 52Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent Publishing... -
Computational Number Theory and Modern Cryptography by Song Y. Yan 9781118188583
$205.99The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In... -
Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain by Kathleen M. Moriarty 9781839099311
RRP: $96.58$80.68The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand...