Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Cloud Security: Concepts, Applications and Perspectives by Brij B. Gupta 9780367722968
RRP: $130.63Booksplease Price: $114.62Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced... -
Introduction to Cybersecurity:: Concepts, Principles, Technologies and Practices by Ajay Singh 9789393330314
Booksplease Price: $48.52Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9789393330314Author Ajay SinghFormat PaperbackPage Count 328Imprint Universities PressPublisher Universities PressDimensions(mm) 240mm * 180mm * 50mm -
Forensic Accounting and Fraud Investigation for Internal Auditors by William J. Jennings 9780367639648
RRP: $253.50Booksplease Price: $230.20This book covers every aspect of forensic accounting, anti-fraud control systems, and fraud investigations. The author uses his own case experience to guide the reader through each phase of a forensic accounting assignment and fraud investigation. The... -
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job Chris Butler 9780471779872
RRP: $38.98Booksplease Price: $27.61Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will helpDivided into two parts: how to get the job and a security crash course to prepare for the job interviewSecurity is one... -
The Re-Evolution of American Street Gangs by Dale L. June
RRP: $79.93Booksplease Price: $72.29The problem of gangs and gang subculture is a growing threat to the stability of neighborhoods and entire communities. During the past two decades, gang members have increasingly migrated from large urban centers to suburban areas and other countries... -
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) Dan Shoemaker 9780367658625
RRP: $87.73Booksplease Price: $81.80A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework... -
Fraud Hotlines: Design, Performance, and Assessment by Chelsea A. Binns
RRP: $62.38Booksplease Price: $58.19This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the... -
Understanding White-Collar Crime: A Convenience Perspective by Petter Gottschalk
RRP: $79.93Booksplease Price: $72.29Understanding White-Collar Crime develops the concept of convenience as the main explanation for crime occurrence. Examining all three dimensions of crime-economic, organizational, and behavioral-the book argues that when white-collar crime becomes less... -
Change Management for Risk Professionals by James J. Leflar
RRP: $204.75Booksplease Price: $185.37Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about change management. Organizations exist within a complex and changing environment. The changes within the organizational context (e.g.,... -
Building in Security at Agile Speed James Ransome (Senior Director, Product Security, McAfee - An Intel Company, Santa Clara California, USA) 9780367433260
RRP: $116.98Booksplease Price: $103.12Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S... -
The Data Protection Officer: Profession, Rules, and Role by Paul Lambert
RRP: $85.78Booksplease Price: $78.45The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and... -
Secure Computers and Networks: Analysis, Design, and Implementation by Eric A. Fisch
RRP: $77.98Booksplease Price: $70.61This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns... -
Police Suicide: Is Police Culture Killing Our Officers? by Ronald A. Rufo
RRP: $93.58Booksplease Price: $86.68There is no question that more police officers die from suicide than those killed in the line of duty. The suicide and attempted suicide of police officers is a mental health concern that has been neglected for far too long.Police Suicide: Is Police... -
Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level by Florian Skopik
RRP: $234.00Booksplease Price: $222.50Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on... -
Crime Prevention: Theory and Practice, Second Edition Stephen Schneider 9780367738679
RRP: $70.18Booksplease Price: $65.75In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest research, the most recently published articles and books, and feedback from professors and students using the first... -
Invitation to Cryptology by Thomas H. Barr
RRP: $231.09Booksplease Price: $223.68For a one-semester undergraduate-level course in Cryptology, Mathematics, or Computer Science. Designed for either the intelligent freshman (good at math) or for a low-level junior year first course, Cryptology introduces a wide range of up-to-date... -
The CIO's Guide to Information Security Incident Management Matthew William Arthur Pemble 9781466558250
RRP: $120.88Booksplease Price: $107.37This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident... -
Cryptanalysis of RSA and Its Variants M. Jason Hinek 9781420075182
RRP: $214.50Booksplease Price: $185.95Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and... -
Understanding and Applying Cryptography and Data Security by Adam J. Elbirt
RRP: $253.50Booksplease Price: $223.47A How-to Guide for Implementing Algorithms and Protocols Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and... -
The CIO’s Guide to Information Security Incident Management by Matthew William Arthur Pemble
RRP: $87.73Booksplease Price: $78.45This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident... -
Cyber Crime Investigator's Field Guide Bruce Middleton 9780849327681
RRP: $155.98Booksplease Price: $136.01Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth... -
Enterprise Level Security: Securing Information Systems in an Uncertain World by William R. Simpson
RRP: $204.75Booksplease Price: $177.72Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much... -
Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann 9780849354021
RRP: $263.25Booksplease Price: $233.32While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an... -
Leveraging Consumer Psychology for Effective Health Communications: The Obesity Challenge: The Obesity Challenge by Rajeev Batra
RRP: $85.78Booksplease Price: $77.30This timely book brings together some of the most higly respected scholars and practitioners in the consumer psychology and health communication fields to analyze how the latest research can be effectively applied to the critical public health issue of... -
Wireless Multimedia Communication Systems: Design, Analysis, and Implementation by K. R. Rao
RRP: $195.00Booksplease Price: $169.49Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems:... -
Better Security in 8 Easy Steps: A Simple Cyber Resilience Guide for Business by Kim Crawley
RRP: $44.83Booksplease Price: $31.45Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded... -
Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray
RRP: $66.28Booksplease Price: $38.69Readers learn how to leverage human psychology and publicly available information to attack a target. The book includes sections on how to evade detection, spear phish, generate reports, and protect victims to ensure their well-being. Readers learn how... -
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments by Kushantha Gunawardana 9781801810210
Booksplease Price: $54.19Dive into privacy, security, and online anonymity to safeguard your identityKey FeaturesLeverage anonymity to completely disappear from the public viewBe a ghost on the web, use the web without leaving a trace, and master the art of invisibilityBecome... -
Information Security Policies, Procedures, and Standards: A Practitioner's Reference by Douglas J. Landoll 9780367669966
RRP: $62.38Booksplease Price: $57.60Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and... -
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense by Gavin Watson 9780124201248
RRP: $72.13Booksplease Price: $66.51Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical... -
Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software by Nir Yehoshua 9781801079747
Booksplease Price: $56.06Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniquesKey FeaturesGain a clear understanding of the security landscape and research approaches to bypass antivirus softwareBecome well-versed with practical... -
SSCP Systems Security Certified Practitioner Practice Exams by Nick Mitropoulos
RRP: $60.43Booksplease Price: $44.19Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Hundreds of accurate practice questions and in-depth answer... -
Application Security Program Handbook by Derek Fisher
RRP: $76.03Booksplease Price: $56.75Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to implement a robust... -
Mechanics of User Identification and Authentication: Fundamentals of Identity Management Dobromir Todorov (Consultant, Buckinghamshire, UK) 9781420052190
RRP: $253.50Booksplease Price: $223.47User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the... -
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework Jessey Bullock 9781118918210
RRP: $82.88Booksplease Price: $58.77Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network... -
Democracy Hacked: How Technology is Destabilising Global Politics by Martin Moore 9781786074089
RRP: $33.13Booksplease Price: $30.15In the space of one election cycle, authoritarian governments, moneyed elites and fringe hackers figured out how to game elections, bypass democratic processes, and turn social networks into battlefields. Facebook, Google and Twitter - where our politics... -
Penetration Testing: A guide for business and IT managers by James Hayes 9781780174082
RRP: $68.23Booksplease Price: $61.87Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure. This guide for business and IT managers, developed in collaboration with CREST, explains... -
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs by Chad Maurice 9781803242996
Booksplease Price: $54.19Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features * Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries *... -
Protective Security: Creating Military-Grade Defenses for Your Digital Business by Jim Seaman
RRP: $97.48Booksplease Price: $33.93This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your... -
Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect their Businesses by Jonathan Reuvid 9781785079153
RRP: $77.98Booksplease Price: $74.92Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781785079153Author Jonathan ReuvidFormat PaperbackPage Count 200Imprint Legend BusinessPublisher Legend Press LtdWeight(grams) 690g