Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
How to Cheat at Windows System Administration Using Command Line Scripts by Pawan K. Bhardwaj 9781597491051
RRP: €39.26€35.49How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version... -
Complete Guide to CISM Certification by Thomas R. Peltier
RRP: €113.04€98.47The Certified Information Security Manager (R)(CISM (R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA (R)). It has been designed specifically for experienced information security managers and those... -
Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' by Eduardo Alberto Vela Nava 9781597496049
RRP: €47.59€32.59Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your... -
Ethical Hacking and Penetration Testing Guide by Rafay Baloch
RRP: €67.82€59.99Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and... -
Building Robots With Lego Mindstorms by Mario Ferrari 9781928994671
RRP: €44.02€39.58Lego robots! Mindstorms are sweeping the world and fans need to learn how to programme them Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs... -
Soft Target Hardening: Protecting People from Attack by Jennifer Hesterman
RRP: €82.10€71.30The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft... -
The Basics of Web Hacking: Tools and Techniques to Attack the Web by Josh Pauli 9780124166004
RRP: €28.55€19.19The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage... -
PowerShell and Python Together: Targeting Digital Investigations by Chet Hosmer 9781484245033
RRP: €47.59€32.23Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to... -
Augmented Reality: An Emerging Technologies Guide to AR by Greg Kipper 9781597497336
RRP: €41.64€27.49With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing... -
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations by Niranjan Reddy
RRP: €47.59€36.77Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them... -
100 Things You Should Know About Authorizations in SAP by Massimo Manara 9781592294060
RRP: €77.35€63.08Work smarter with authorizations! Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with ""100 Things"" that unlock the secrets of managing your security and... -
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks by Susan Young
RRP: €142.80€124.49The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is... -
Security Patterns: Integrating Security and Systems Engineering by Markus Schumacher 9780470858844
RRP: €47.60€32.31Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational... -
Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin 9781597492683
RRP: €65.44€58.68Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and... -
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions by Slava Gomzin 9781118810118
RRP: €56.53€49.28Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many... -
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition by Frederick S. Calhoun
RRP: €95.19€82.82The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100... -
Mastering FreeBSD and OpenBSD Security by Bruce Potter 9780596006266
RRP: €47.59€31.59FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization,... -
Quadratics by Richard A. Mollin 9780367401528
RRP: €73.77€63.80The first thing you will find out about this book is that it is fun to read. It is meant for the browser, as well as for the student and for the specialist wanting to know about the area. The footnotes give an historical background to the text, in... -
IT Security Risk Control Management: An Audit Preparation Plan by Raymond Pompon
RRP: €65.44€52.42Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.Information security is more than configuring... -
Coding for Penetration Testers: Building Better Tools by Jason Andress 9780128054727
RRP: €44.02€39.58Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of... -
Quantum Communications and Cryptography by Alexander V. Sergienko 9780367391744
RRP: €73.77€63.80All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because... -
Privacy and Big Data: The Players, Regulators, and Stakeholders by Terence Craig 9781449305000
RRP: €19.03€13.01In 1964, Bob Dylan wrote and released The Times They Are a-Changin,A" a song that beautifully captured the turbulence of that time. In 2011, we are again facing turbulent times but not one of protests and sit-ins. Rather, the debate about data privacy... -
Digital Forensics Explained by Greg Gogolin
RRP: €63.06€54.78This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations... -
Scene of the Cybercrime by Debra Littlejohn Shinder 9781597492768
RRP: €55.92€51.22When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases... -
Invitation to Cryptology by Thomas H. Barr
RRP: €141.03€125.79For a one-semester undergraduate-level course in Cryptology, Mathematics, or Computer Science. Designed for either the intelligent freshman (good at math) or for a low-level junior year first course, Cryptology introduces a wide range of up-to-date... -
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic Foundations by Duncan Buell
RRP: €45.21€40.97Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible.This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one... -
Cybersecurity for Space: Protecting the Final Frontier by Jacob G. Oakley
RRP: €47.59€33.28This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the... -
Hackable: How to Do Application Security Right by Ted Harrington 9781544517667
RRP: €19.03€14.04Sorry no description is available for this book at this time. -
Designing to FIPS-140: A Guide for Engineers and Programmers by David Johnston 9798868801242
RRP: €65.44€43.88This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related... -
Insider Threats Meet Access Control: Insider Threats Detected Using Intent-Based Access Control (Ibac) by Abdulaziz M Almehmadi Phd 9781983529184
RRP: €29.57€24.31Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781983529184Author Abdulaziz M Almehmadi PhdFormat PaperbackPage Count 214Imprint Createspace Independent Publishing PlatformPublisher Createspace... -
Foundations of Security: What Every Programmer Needs to Know by Christoph Kern 9781590597842
RRP: €77.34€58.56Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems... -
Progress in Cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings by Guang Gong 9783642174001
€62.38Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the... -
Managing Projects for Success: A Trilogy by Albert Hamilton 9780727734976
RRP: €138.64€115.75Managing Projects for success is a how to do it book of considerable value to practitioners and students alike. It provides the challenge of theory application through a series of exercises and is comprehensively illustrated. Managing Projects for... -
Hacking for Beginners: The Ultimate Guide to Becoming a Hacker by Bob Bittex 9781979786751
RRP: €13.08€11.26Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781979786751Author Bob BittexFormat PaperbackPage Count 154Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent Publishing... -
Cloud Computing Service Metrics Descriptions: Nist Sp 500-307 by National Institute of Standards and Tech 9781718787773
RRP: €18.96€15.89Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718787773Author National Institute of Standards and TechFormat PaperbackPage Count 46Imprint Createspace Independent Publishing PlatformPublisher... -
Guide to Industrial Wireless Systems Deployments: Nist Ams 300-4 by National Institute of Standards and Tech 9781718788275
RRP: €25.31€20.83Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718788275Author National Institute of Standards and TechFormat PaperbackPage Count 66Imprint Createspace Independent Publishing PlatformPublisher... -
Computer Security Incident Handling Guide by Nist 9781494726379
RRP: €16.65€14.09Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781494726379Author NistFormat PaperbackPage Count 94Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent Publishing... -
Information Security For The Rest Of Us by Cr3 Concepts LLC 9781987441680
RRP: €22.60€21.85Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781987441680Author Cr3 Concepts LLCFormat PaperbackPage Count 544Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent... -
Staying Safe at School by Chester L. Quarles 9781439858288
RRP: €35.69€31.70Now more than ever before, today's schools are hazard zones. Students are vulnerable to attack from other students and random individuals who may appear to be harmless on the surface or who may be sending out warning signals. Either way, to save their... -
Secure Yourself: Staying Safe in a Digital World by Dimitri Fousekis 9781700117465
RRP: €11.89€10.29Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781700117465Author Dimitri FousekisFormat PaperbackPage Count 102Imprint Independently PublishedPublisher Independently PublishedWeight(grams) 191g