Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Building Secure Firmware: Armoring the Foundation of the Platform by Jiewen Yao
RRP: €59.49€48.87Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its... -
Data Analytics for Internal Auditors by Richard E. Cascarino
RRP: €53.54€47.22There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The... -
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson
RRP: €77.34€64.05Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional... -
An Introduction to Crime and Crime Causation by Robert C. Winters
RRP: €42.83€37.71An Introduction to Crime and Crime Causation is a student-friendly textbook that defines and explains the concepts of crime, criminal law, and criminology. Ideal for a one-semester course, the book compares and contrasts early criminal behavior and... -
A Vulnerable System: The History of Information Security in the Computer Age by Andrew J. Stewart 9781501758942
RRP: €35.69€26.41As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our... -
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies by Ira Winkler 9780128093160
RRP: €44.02€39.10Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home... -
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues by Sanjib Sinha
RRP: €77.34€58.63Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with... -
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James Foster 9781597490054
RRP: €47.59€43.35The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about... -
Strategic Security Management: A Risk Assessment Guide for Decision Makers, Second Edition by Karim Vellani
RRP: €67.82€58.80Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into... -
Building in Security at Agile Speed by James Ransome
RRP: €71.39€61.80Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S... -
Security Power Tools by Bryan Burns 9780596009632
RRP: €57.11€38.21What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? "Security Power Tools" lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few... -
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic by Robert Shimonski 9780124104136
RRP: €30.93€27.07The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature... -
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace by Todd G. Shipley 9780124078178
RRP: €44.02€40.29Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step... -
Access Control, Security, and Trust: A Logical Approach by Shiu-Kai Chin
RRP: €130.90€113.66Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security... -
CCTV: From Light to Pixels by Vlado Damjanovski 9780124045576
RRP: €84.48€75.23The new edition of CCTV, a high-level professional reference, is expanded to cover all video compression techniques used in the ever-increasing assortment of digital video recorders (DVRs) available on the market today. In addition to demystifying DVR... -
SAP System Security by Joe Markgraf
RRP: €102.34€84.09If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you. Discover information on security-relevant issues, from identity and access management to network and backend security. Then get the technical... -
Corporate Computer Security, Global Edition by Randall J. Boyle
RRP: €91.62€82.55For introductory courses in IT Security. A strong business focus through a solid technical presentation of security tools. Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This... -
Writing Security Tools and Exploits by James Foster
RRP: €45.21€43.22Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated... -
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources by Morey J. Haber
RRP: €65.44€48.94Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus-it is not a matter of if, but rather when an organization will be breached. Threat... -
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects by Brett Shavers 9781597499859
RRP: €52.35€46.73Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work... -
Cyber Crime and Cyber Terrorism Investigator's Handbook by Professor Babak Akhgar 9780128007433
RRP: €47.59€42.64Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war... -
Buffer Overflow Attacks: Detect, Exploit, Prevent by Jason Deckard 9781932266672
RRP: €34.50€31.38The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon... -
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement by W. Krag Brotby
RRP: €95.19€82.82Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity... -
Forensic Accounting and Fraud Investigation for Internal Auditors by William J. Jennings
RRP: €53.54€46.74This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forensic accounting assignment and fraud investigation. The... -
Deception in the Digital Age: Exploiting and Defending Human Targets through Computer-Mediated Communications by Cameron H. Malin 9780124116306
RRP: €65.44€57.96Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used... -
Hacking: The Next Generation by Nitesh Dhanjani 9780596154578
RRP: €38.07€24.53With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in... -
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies by Carey Parker 9781484238516
RRP: €35.69€33.08Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just... -
Risk Analysis and Security Countermeasure Selection by Thomas L. Norman
RRP: €154.70€134.60This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies and technologies for addressing existing and future threats. It covers risk analysis methodologies... -
Collaborative Policing: Police, Academics, Professionals, and Communities Working Together for Education, Training, and Program Implementation by Peter C. Kratcoski
RRP: €115.42€100.50"The chapters in this book reveal that police education, training, and practices are now closely tied to collaboration between police, academics, professional practitioners, and community agencies, and such collaboration is described and evaluated... -
Blackhatonomics: An Inside Look at the Economics of Cybercrime by Will Gragido 9781597497404
RRP: €35.69€31.94Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of... -
Assessing and Managing Security Risk in IT Systems: A Structured Methodology by John McCumber
RRP: €83.29€72.30Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of... -
Tor and The Dark Net: Remain Anonymous and Evade NSA Spying by Colonel James Smith 9780692674444
RRP: €13.05€11.04Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780692674444Author Colonel James SmithFormat PaperbackPage Count 114Imprint Pinnacle PublishersPublisher Pinnacle PublishersWeight(grams) 163gDimensions(mm)... -
No-Body Homicide Cases: A Practical Guide to Investigating, Prosecuting, and Winning Cases When the Victim Is Missing by Thomas A.(Tad) DiBiase 9780367779191
RRP: €59.49€51.77How do you prove someone guilty of murder when the best piece of evidence-the victim's body-is missing? Exclusively dedicated to the investigation and prosecution of no-body homicide cases, this book provides the author's insight gained from... -
Configuring SonicWALL Firewalls by Dan Bendell 9781597492508
RRP: €47.59€42.64SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in... -
Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom by Larry Daniel 9781597496438
RRP: €52.35€46.73Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors' years of experience in working with attorneys as digital forensics experts, common questions... -
Securing the Cloud: Cloud Computer Security Techniques and Tactics by Patrick Foxhoven 9781597495929
RRP: €55.92€49.79Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a... -
Introduction to Social Media Investigation: A Hands-on Approach by Jennifer Golbeck 9780128016565
RRP: €55.92€49.79If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web,... -
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job by Chris Butler 9780471779872
RRP: €23.79€15.89Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will helpDivided into two parts: how to get the job and a security crash course to prepare for the job interviewSecurity is one... -
Beyond Cybersecurity: Protecting Your Digital Business by James M. Kaplan
RRP: €36.88€23.81Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and... -
On Cyber: Towards an Operational Art for Cyber Conflict by David Raymond 9780692911563
RRP: €41.65€34.90Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780692911563Author David RaymondFormat PaperbackPage Count 354Imprint Kopidion PressPublisher Kopidion PressWeight(grams) 472gDimensions(mm) 229mm * 152mm *...