Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Professional Red Teaming: Conducting Successful Cybersecurity Engagements by Jacob G. Oakley 9781484243084
RRP: $68.59$47.03Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is... -
Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense by Nihad Hassan 9780128044490
RRP: $63.45$57.05"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and... -
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security by Raj Samani 9780124201255
RRP: $80.60$71.08CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the... -
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice by Jason Andress 9780128007440
RRP: $48.01$41.90As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand... -
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats by Will Gragido 9781597496131
RRP: $75.46$51.44Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and... -
Principles of Information Security by Michael Whitman 9781337102063
$130.17Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all... -
Big Breaches: Cybersecurity Lessons for Everyone by Neil Daswani
RRP: $48.01$38.53The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone-not just... -
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense by Gavin Watson 9780124201248
RRP: $63.45$57.05Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical... -
Data Analytics for Internal Auditors by Richard E. Cascarino 9781498737142
RRP: $111.48$96.98There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The... -
Cyber Security and IT Infrastructure Protection by John R. Vacca
RRP: $63.45$57.05This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent... -
FISMA Compliance Handbook: Second Edition by Laura Taylor 9780124058712
RRP: $94.32$83.55This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law... -
Cyberwar and Revolution: Digital Subterfuge in Global Capitalism by Nick Dyer-Witheford 9781517904111
RRP: $37.72$32.23Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear... -
CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers by Todd Fitzgerald 9781498740449
RRP: $205.84$177.72#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022!2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success,... -
CompTIA PenTest+ Guide to Penetration Testing by Rob Wilson
$91.49Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps you gain the knowledge and skills necessary to analyze systems in the same way hackers do. It provides the information... -
Data-Driven Security: Analysis, Visualization and Dashboards by Jay Jacobs 9781118793725
RRP: $65.16$57.94Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most... -
Managing Security with Snort & IDS Tools by Kerry J. Cox 9780596006617
RRP: $54.87$35.35Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth... -
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress 9780124166721
RRP: $51.44$46.04Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of... -
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition by Jan Killmeyer
RRP: $205.84$178.41Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security... -
Digital Identity by Phil Windley 9780596008789
RRP: $48.01$32.92The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many... -
Snort Intrusion Detection and Prevention Toolkit by Brian Caswell 9781597490993
RRP: $68.59$48.01This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features... -
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin by Paul C. van Oorschot 9783030834104
RRP: $94.32$84.67This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a... -
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Derrick Rountree 9780124059320
RRP: $44.58$29.86As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear... -
Cybersecurity ??? Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics by Yuri Diogenes
RRP: $56.59$54.87Enhance your organization's secure posture by improving your attack and defense strategies About This Book * Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team... -
The Database Hacker's Handbook: Defending Database Servers by David Litchfield
RRP: $54.87$36.04Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database... -
The Social Engineer's Playbook: A Practical Guide to Pretexting by Jeremiah Talamantes 9780692306611
RRP: $29.31$25.33Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780692306611Author Jeremiah TalamantesFormat PaperbackPage Count 202Imprint Hexcode PublishingPublisher Hexcode PublishingWeight(grams) 277gDimensions(mm)... -
Advanced Cybersecurity Technologies by Ralph Moseley
RRP: $84.03$73.17Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human... -
Secrets of a Cyber Security Architect by Brook S. E. Schoenfield 9781498741996
RRP: $101.19$87.62Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?Cyber security is a... -
Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments by Andy Richter 9780128044575
RRP: $94.32$83.55With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management... -
Managed Code Rootkits: Hooking into Runtime Environments by Erez Metula 9781597495745
RRP: $68.59$46.98Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out... -
Cybersecurity and Applied Mathematics by Leigh Metcalf 9780128044520
RRP: $87.46$76.98Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical... -
Narco-Cults: Understanding the Use of Afro-Caribbean and Mexican Religious Cultures in the Drug Wars by Tony M. Kail
RRP: $101.19$87.62Those who know about how spirituality plays into the world of drug smuggling have likely heard of Santa Muerte, Jesus Malverde, and Santeria, but the details of the more obscure African religions and Latin American folk saints and cults often remain a... -
Network Security Bible by Eric Cole
RRP: $81.48$55.59The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security,... -
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Branden R. Williams 9780128015797
RRP: $94.32$83.55Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI... -
X-Ways Forensics Practitioner's Guide by Brett Shavers 9780124116054
RRP: $80.60$71.08The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private... -
Building Robots with LEGO Mindstorms NXT by David Astolfo 9781597491525
RRP: $49.73$33.79The Ultimate Tool for MINDSTORMS (R) Maniacs The new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to... -
Hardening Cisco Routers by Thomas Akin 9780596001667
RRP: $34.29$22.90Network administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This book focuses on ways to secure Cisco routers, it is a reference for protecting the protectors... -
Metrics and Methods for Security Risk Management by Carl Young 9781856179782
RRP: $65.16$44.75Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics... -
Exploring Careers in Cybersecurity and Digital Forensics by Lucy K. Tsado 9781538140611
RRP: $51.46$46.45Cybersecurity is a fairly new academic discipline. Therefore, most of the books written are mainly focused on classroom material and resources. To the best of our knowledge, there isn't a book that targets criminal justice and other nontechnical students... -
Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations, Fourth Edition by Michael R. Ronczkowski 9781032096452
RRP: $106.33$91.96The ability of law enforcement agencies to manage and act upon intelligence is the key to countering terrorism. Likewise, a critical foundation of intelligence-led policing is the proper analysis of all information gained. Terrorism and Organized Hate... -
Hadoop Security by Ben Spivey 9781491900987
RRP: $68.59$45.54As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect...