Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World by Kevin E. Foltz 9780367532963
RRP: $90.28$78.94Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its... -
Zero Trust Journey Across the Digital Estate by Binil A. Pillai 9781032125480
RRP: $220.50$190.81* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit... -
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century by Shimon Brathwaite 9781032206080
RRP: $79.78$70.10This book teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish... -
Cryptographic City: Decoding the Smart Metropolis Richard Coyne 9780262545679
RRP: $79.80$55.78Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262545679Author Richard CoyneFormat PaperbackPage Count 280Imprint MIT PressPublisher MIT Press Ltd -
Managing Information Technology by Liam Lewis
RRP: $243.60$220.67Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781641723794Author Liam LewisFormat HardbackPage Count 226Imprint Larsen and Keller EducationPublisher Larsen and Keller EducationWeight(grams) 762g -
Enterprise Level Security 1 & 2 by Kevin Foltz
RRP: $220.50$194.17• The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program.• The book is intended for enterprise IT architecture... -
Dynamically-Enabled Cyber Defense by Lin Yang
RRP: $262.50$226.95Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9789811234330Author Lin YangFormat HardbackPage Count 320Imprint World Scientific Publishing Co Pte LtdPublisher World Scientific Publishing Co Pte Ltd -
Security without Obscurity: Frequently Asked Questions (FAQ) Jeff Stapleton 9780367708139
RRP: $77.68$68.31Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions... -
Blockchain Technology and Applications by Pethuru Raj
RRP: $157.48$138.08Blockchain is emerging as a powerful technology, which has attracted the wider attention of all businesses across the globe. In addition to financial businesses, IT companies and business organizations are keenly analyzing and adapting this technology... -
Convergence of Blockchain, AI and IoT: A Digital Platform by B Balamurugan
RRP: $188.98$163.99Convergence of Blockchain, AI and IoT: A Digital Platform discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel... -
Cryptology For Engineers: An Application-oriented Mathematical Introduction by Robert Schmied
RRP: $189.00$164.18Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants - But do we want to disclose private information while executing a... -
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World by Kevin E. Foltz
RRP: $163.78$143.43Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its... -
Discrete Mathematics with Cryptographic Applications: A Self-Teaching Introduction by Alexander I Kheyfits
RRP: $144.90$95.53No detailed description available for "Discrete Mathematics With Cryptographic Applications".About the AuthorKheyfits Alexander I. : Alexander I. Kheyfits, Ph.D. taught undergraduate and graduate-level subjects in mathematics and computer science for... -
Cryptography and Network Security by Marcelo Sampaio de Alencar
RRP: $252.00$217.58Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9788770224079Author Marcelo Sampaio de AlencarFormat HardbackPage Count 298Imprint River PublishersPublisher River PublishersWeight(grams) 156g -
Asymmetric Cryptography – Primitives and Protocols by D Pointcheval
RRP: $262.50$227.35Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781789450965Author D PointchevalFormat HardbackPage Count 304Imprint ISTE LtdPublisher ISTE LtdWeight(grams) 536g -
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century by Shimon Brathwaite
RRP: $144.88$124.99This book teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish... -
Risk Control Theory Of Online Transactions by Changjun Jiang
RRP: $189.00$164.18Online transaction has become an important part of the new economy and finance. At the same time, transaction payment fraud also presents an explosive trend.This unique compendium introduces risk control theories technologies of online transaction... -
Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology by Wayne Patterson
RRP: $115.48$100.21This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of... -
Visual Cryptography and Secret Image Sharing by Stelvio Cimato
RRP: $161.68$142.91With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual... -
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program John Jackson (Hacking Group: Sakura Samurai) 9781119782520
RRP: $197.30$171.09CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs,... -
Discrete Dynamical Systems and Chaotic Machines: Theory and Applications by Jacques M. Bahi
RRP: $220.50$190.81For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts... -
Cryptography In The Information Society by Boris Ryabko
RRP: $168.00$146.24This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers,... -
Essential Enterprise Blockchain Concepts and Applications by Kavita Saini
RRP: $157.48$137.24Blockchain is a technology that has attracted the attention of all types of businesses. Cryptocurrency such as Bitcoin has gained the most attention, but now companies are applying Blockchain technology to develop solutions improving traditional... -
A-Z Password Book: Individual Letter Tabs to Quickly Access Login Information by none
RRP: $18.88$12.79Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780593435823Author ZeitgeistFormat PaperbackPage Count 144Imprint ZeitgeistPublisher Random House USA IncWeight(grams) 272gDimensions(mm) 229mm * 152mm *... -
Cryptology: Classical and Modern Richard Klima 9781138047624
RRP: $231.00$201.83Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes... -
A Cryptography Primer: Secrets and Promises by Philip N. Klein 9781107603455
RRP: $60.88$51.28Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from... -
Introduction to Coding Theory Jurgen Bierbrauer 9781482299809
RRP: $182.68$159.47This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second... -
Computer Security and Encryption: An Introduction by S. R. Chauhan
RRP: $98.60$67.52Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of... -
ManusCrypt: Designed for Mankind – Anthropocentric Information Security Prashant A Upadhyaya 9781032863641
RRP: $94.48$80.30Information Security primarily serves these six distinct purposes – Authentication, Authorization, Prevention of Data Theft, Sensitive Data Safety / Privacy, Data Protection / Integrity, Non-Repudiation. The entire gamut of infosec rests upon... -
ManusCrypt: Designed for Mankind – Anthropocentric Information Security Prashant A Upadhyaya 9781032842400
RRP: $231.00$196.35Information Security primarily serves these six distinct purposes – Authentication, Authorization, Prevention of Data Theft, Sensitive Data Safety / Privacy, Data Protection / Integrity, Non-Repudiation. The entire gamut of infosec rests upon... -
Generative AI and Digital Forensics Ravindra Das 9781032744865
RRP: $62.98$53.53In today’s world, Cybersecurity attacks and security breaches are literally becoming the norm. Unfortunately, we are not immune to it, any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as... -
Advances in Cryptology – CRYPTO 2024: 44th Annual International Cryptology Conference, CRYPTO 2024, Santa Barbara, CA, USA, August 18–22, 2024, Proceedings, Part IX Leonid Reyzin 9783031683992
$137.07The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in... -
Generative AI and Digital Forensics Ravindra Das 9781032742458
RRP: $231.00$196.35In today’s world, Cybersecurity attacks and security breaches are literally becoming the norm. Unfortunately, we are not immune to it, any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as... -
Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology Wayne Patterson 9780367509804
RRP: $41.98$37.15Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780367509804Author Wayne PattersonFormat PaperbackPage Count 172Imprint RoutledgePublisher Taylor & Francis LtdWeight(grams) 453g -
The CISO Playbook Andres Andreu 9781032762074
RRP: $94.48$80.30A CISO is the ultimate guardian of an organization's digital assets. As a cybersecurity leader a CISO must possess a unique balance of executive leadership, technical knowledge, strategic vision, and effective communication skills. The ever-evolving... -
Encrypted Network Traffic Analysis Aswani Kumar Cherukuri 9783031629082
RRP: $94.48$94.44This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted... -
Post-Quantum Cryptography: 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II Markku-Juhani Saarinen 9783031627453
RRP: $125.98$125.18The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12–14, 2024. The 28 full papers included in these proceedings were carefully reviewed and... -
Progress in Cryptology - AFRICACRYPT 2024: 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10–12, 2024, Proceedings Serge Vaudenay 9783031643804
$137.07This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in Africa, AFRICACRYPT 2024, held in Douala, Cameroon, in July 2024. The 19 full papers included in this book were carefully reviewed and selected from 35... -
The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security Lee Parrish 9781032761633
RRP: $94.48$82.49Independent Directors of corporate boards understand the importance of cybersecurity as a business issue. Increased regulatory requirements, the onslaught of breaches, as well as the replacement of the corporate network perimeter with more third-party... -
The CISO Playbook Andres Andreu 9781032757964
RRP: $231.00$196.35A CISO is the ultimate guardian of an organization's digital assets. As a cybersecurity leader a CISO must possess a unique balance of executive leadership, technical knowledge, strategic vision, and effective communication skills. The ever-evolving...