Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects by Brett Shavers 9781597499859
RRP: $85.78$77.98Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work... -
Buffer Overflow Attacks: Detect, Exploit, Prevent by Jason Deckard 9781932266672
RRP: $56.53$52.42The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon... -
Hacking Nitesh Dhanjani 9780596154578
RRP: $62.38$40.19With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in... -
Risk Analysis and Security Countermeasure Selection Thomas L. Norman, CPP/PSP/CSC 9781482244199
RRP: $253.50$220.56This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies and technologies for addressing existing and future threats. It covers risk analysis methodologies... -
Collaborative Policing: Police, Academics, Professionals, and Communities Working Together for Education, Training, and Program Implementation Peter C. Kratcoski (Kent State University, Canton, Ohio, USA) 9781482251401
RRP: $189.13$164.68"The chapters in this book reveal that police education, training, and practices are now closely tied to collaboration between police, academics, professional practitioners, and community agencies, and such collaboration is described and evaluated... -
Penetration Tester's Open Source Toolkit by Jeremy Faircloth 9780128021491
RRP: $91.63$83.07Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world... -
Web Security 2016 by Oscar Merida 9781940111414
RRP: $37.05$29.99Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781940111414Author Edward BarnardFormat PaperbackPage Count 128Imprint PHP[Architect]Publisher PHP[Architect]Weight(grams) 231gDimensions(mm) 235mm * 191mm... -
Blackhatonomics: An Inside Look at the Economics of Cybercrime by Will Gragido 9781597497404
RRP: $58.48$53.35Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of... -
DNS Security: Defending the Domain Name System by Allan Liska 9780128033067
RRP: $72.13$65.29DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS... -
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks by Mohssen Mohammed 9780367380038
RRP: $111.13$96.35Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on... -
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies by Ira Winkler 9780128093160
RRP: $72.13$65.29Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home... -
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement W. Krag Brotby, CISM (Enterprise Security Architect, Thousand Oaks, California, USA) 9781420052855
RRP: $155.98$135.72Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity... -
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value by Michelle Dennedy 9781430263555
$78.10"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy... -
Security Power Tools by Bryan Burns 9780596009632
RRP: $93.58$62.61What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? "Security Power Tools" lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few... -
Hardening Cisco Routers Thomas Akin 9780596001667
RRP: $38.98$26.03Network administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This book focuses on ways to secure Cisco routers, it is a reference for protecting the protectors... -
Managing Security with Snort and IDS Tools Kerry J Cox 9780596006617
RRP: $62.38$40.19Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth... -
CompTIA PenTest+ Guide to Penetration Testing by Rob Wilson
$105.85Cybersecurity attacks grow more complex every day. The first edition of Wilson's COMPTIA PENTEST+ GUIDE TO PENETRATION TESTING helps you gain the knowledge and skills necessary to analyze systems in the same way hackers do. It provides the information... -
Configuring SonicWALL Firewalls by Dan Bendell 9781597492508
RRP: $77.98$71.16SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in... -
Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom by Larry Daniel 9781597496438
RRP: $85.78$77.98Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors' years of experience in working with attorneys as digital forensics experts, common questions... -
Official (ISC)2 (R) Guide to the CAP (R) CBK (R) by Patrick D. Howard
RRP: $136.48$119.65Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified... -
Securing the Cloud: Cloud Computer Security Techniques and Tactics by Patrick Foxhoven 9781597495929
RRP: $91.63$83.07Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a... -
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job Chris Butler 9780471779872
RRP: $38.98$26.03Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will helpDivided into two parts: how to get the job and a security crash course to prepare for the job interviewSecurity is one... -
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace by Todd G. Shipley 9780124078178
RRP: $72.13$67.24Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step... -
How to Cheat at Windows System Administration Using Command Line Scripts by Pawan K. Bhardwaj 9781597491051
RRP: $64.33$59.26How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version... -
Cybersecurity: Geopolitics, Law, and Policy by Amos N. Guiora
RRP: $85.78$74.96This book examines the legal and policy aspects of cyber-security.It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations... -
An Introduction to Crime and Crime Causation by Robert C. Winters
RRP: $70.18$61.80An Introduction to Crime and Crime Causation is a student-friendly textbook that defines and explains the concepts of crime, criminal law, and criminology. Ideal for a one-semester course, the book compares and contrasts early criminal behavior and... -
Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' by Eduardo Alberto Vela Nava 9781597496049
RRP: $77.98$54.44Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your... -
Ethical Hacking and Penetration Testing Guide Rafay Baloch 9781482231618
RRP: $111.13$98.30Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and... -
Assessing and Managing Security Risk in IT Systems: A Structured Methodology John McCumber (Symantec Corporation, Reston, Virginia, USA) 9780849322327
RRP: $136.48$118.48Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of... -
Digital Forensics: Threatscape and Best Practices by John Sammons 9780128045268
RRP: $72.13$65.29Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in... -
From Hacking to Report Writing: An Introduction to Security and Penetration Testing by Robert Svensson 9781484222829
RRP: $97.48$64.02Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes... -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit by Sagar Rahalkar 9781484242698
RRP: $77.98$49.80Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the... -
Building Robots With Lego Mindstorms by Mario Ferrari 9781928994671
RRP: $72.13$66.07Lego robots! Mindstorms are sweeping the world and fans need to learn how to programme them Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs... -
Deception in the Digital Age: Exploiting and Defending Human Targets through Computer-Mediated Communications by Cameron H. Malin 9780124116306
RRP: $107.23$96.68Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used... -
Security Requirements Engineering: Designing Secure Socio-Technical Systems Fabiano Dalpiaz (Assistant Professor, Utrecht University) 9780262034210
RRP: $101.40$86.19Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262034210Author Fabiano DalpiazFormat HardbackPage Count 224Imprint MIT PressPublisher MIT Press LtdDimensions(mm) 229mm * 178mm * 11mm -
Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect their Businesses by Jonathan Reuvid 9781785079153
RRP: $77.98$76.09Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781785079153Author Jonathan ReuvidFormat PaperbackPage Count 200Imprint Legend BusinessPublisher Legend Press LtdWeight(grams) 690g -
Trusted Computing by Chris Mitchell 9780863415258
RRP: $173.55$164.54As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware... -
Complete Guide to CISM Certification Thomas R. Peltier 9780849353567
RRP: $185.23$161.36The Certified Information Security Manager (R)(CISM (R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA (R)). It has been designed specifically for experienced information security managers and those... -
Cyber Reconnaissance, Surveillance and Defense by Robert Shimonski 9780128013083
RRP: $91.63$83.07At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these... -
Beyond Cybersecurity: Protecting Your Digital Business James M. Kaplan 9781119026846
RRP: $60.43$39.02Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and...