🌷Freshen up your bookshelf with our spring deals 🌷 ️

Recently Viewed

General

Filter By

Sort By:

Display Type:
Filters
  • Book
  • Qty in Cart
  • Quantity
  • Price
  • Subtotal
  • Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings by Joaquin Garcia-Alfaro 9783030003043

    Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings by Joaquin Garcia-Alfaro 9783030003043

    Booksplease Price: £66.26
    This book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £66.26
    Subtotal:
  • Practical Vulnerability Management by Andrew Magnusson

    Practical Vulnerability Management by Andrew Magnusson

    RRP: £28.99
    Booksplease Price: £18.17
    Vulnerability management is a critical and sometimes neglected aspect of information security. It consists of two main parts: awareness and action. First, the security practitioner must be aware of the vulnerabilities that exist in an organisation's...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £28.99
    Booksplease Price: £18.17
    Subtotal:
  • Managing Risk and Information Security: Protect to Enable by Malcolm W. Harkins 9781484214565

    Managing Risk and Information Security: Protect to Enable by Malcolm W. Harkins 9781484214565

    Booksplease Price: £25.14
    Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £25.14
    Subtotal:
  • Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies by Carey Parker 9781484290354

    Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies by Carey Parker 9781484290354

    RRP: £32.99
    Booksplease Price: £24.72
    Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £32.99
    Booksplease Price: £24.72
    Subtotal:
  • Incident Response for Windows: Adapt effective strategies for managing sophisticated cyber attacks targeting Windows systems Anatoly Tykushin 9781804619322

    Incident Response for Windows: Adapt effective strategies for managing sophisticated cyber attacks targeting Windows systems Anatoly Tykushin 9781804619322

    Booksplease Price: £31.52
    Get to grips with modern sophisticated attacks, their intrusion life cycles, and the key motivations of adversaries, and build the most effective cybersecurity incident preparedness, response, remediation, and prevention methodologies Key Features ...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £31.52
    Subtotal:
  • Java Cryptography Jonathon Knudsen 9781565924024

    Java Cryptography Jonathon Knudsen 9781565924024

    RRP: £35.99
    Booksplease Price: £26.89
    Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £35.99
    Booksplease Price: £26.89
    Subtotal:
  • Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication by Robert W. Gehl

    Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication by Robert W. Gehl

    Booksplease Price: £29.09
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262543453Author Robert W. GehlFormat PaperbackPage Count 304Imprint MIT PressPublisher MIT Press Ltd
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £29.09
    Subtotal:
  • Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition by David Zientara 9781788993173

    Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition by David Zientara 9781788993173

    Booksplease Price: £41.66
    Install and configure a pfSense router/firewall, and become a pfSense expert in the process. About This Book * You can always do more to secure your software - so extend and customize your pfSense firewall * Build a high availability security...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £41.66
    Subtotal:
  • Cyber Strategy: Risk-Driven Security and Resiliency by Carol Siegel

    Cyber Strategy: Risk-Driven Security and Resiliency by Carol Siegel

    RRP: £41.99
    Booksplease Price: £37.99
    Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £41.99
    Booksplease Price: £37.99
    Subtotal:
  • The Tangled Web by Michal Zalewski 9781593273880

    The Tangled Web by Michal Zalewski 9781593273880

    RRP: £56.99
    Booksplease Price: £35.15
    Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £56.99
    Booksplease Price: £35.15
    Subtotal:
  • Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations by Morey J. Haber

    Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations by Morey J. Haber

    RRP: £39.99
    Booksplease Price: £29.55
    Build an effective vulnerability management strategy to protect your organization's assets, applications, and data.Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £39.99
    Booksplease Price: £29.55
    Subtotal:
  • Python Digital Forensics Cookbook by Preston Miller 9781783987467

    Python Digital Forensics Cookbook by Preston Miller 9781783987467

    Booksplease Price: £39.69
    Over 60 recipes to help you learn digital forensics and leverage Python scripts to amplify your examinations About This Book * Develop code that extracts vital information from everyday forensic acquisitions. * Increase the quality and efficiency...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £39.69
    Subtotal:
  • Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations by Robert J. Girod

    Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations by Robert J. Girod

    RRP: £35.99
    Booksplease Price: £33.23
    All too often, professional investigations fail because those involved jump to conclusions and draw faulty premises that leave the trail cold. Correct conclusions are not the result of guessing, but by applying efficient thought processes. Logical...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £35.99
    Booksplease Price: £33.23
    Subtotal:
  • Routledge Handbook of Surveillance Studies Kirstie Ball 9781138026025

    Routledge Handbook of Surveillance Studies Kirstie Ball 9781138026025

    RRP: £65.99
    Booksplease Price: £59.24
    Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £65.99
    Booksplease Price: £59.24
    Subtotal:
  • Trusted Data: A New Framework for Identity and Data Sharing by Thomas Hardjono 9780262043212

    Trusted Data: A New Framework for Identity and Data Sharing by Thomas Hardjono 9780262043212

    Booksplease Price: £29.31
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262043212Author Thomas HardjonoFormat PaperbackPage Count 400Imprint MIT PressPublisher MIT Press LtdDimensions(mm) 203mm * 137mm * 24mm
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £29.31
    Subtotal:
  • Snowflake Security: Securing Your Snowflake Data Cloud by Ben Herzberg 9781484273883

    Snowflake Security: Securing Your Snowflake Data Cloud by Ben Herzberg 9781484273883

    RRP: £49.99
    Booksplease Price: £33.00
    This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £49.99
    Booksplease Price: £33.00
    Subtotal:
  • Data-Driven Security: Analysis, Visualization and Dashboards Jay Jacobs 9781118793725

    Data-Driven Security: Analysis, Visualization and Dashboards Jay Jacobs 9781118793725

    RRP: £37.99
    Booksplease Price: £34.89
    Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £37.99
    Booksplease Price: £34.89
    Subtotal:
  • Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists by Tobias Baer 9781484248843

    Understand, Manage, and Prevent Algorithmic Bias: A Guide for Business Users and Data Scientists by Tobias Baer 9781484248843

    RRP: £49.99
    Booksplease Price: £33.77
    Are algorithms friend or foe?The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £49.99
    Booksplease Price: £33.77
    Subtotal:
  • Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program by Ryan Leirvik 9781484293188

    Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program by Ryan Leirvik 9781484293188

    RRP: £54.99
    Booksplease Price: £36.27
    When it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    Booksplease Price: £36.27
    Subtotal:
  • Security Without Obscurity: A Guide to PKI Operations by Jeff Stapleton 9781032545257

    Security Without Obscurity: A Guide to PKI Operations by Jeff Stapleton 9781032545257

    RRP: £50.99
    Booksplease Price: £46.08
    Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £50.99
    Booksplease Price: £46.08
    Subtotal:
  • PCI Dss Made Easy 2017: (Pci Dss 3.2 Edition, 2017 Revision) by Yves B Desharnais 9780994837493

    PCI Dss Made Easy 2017: (Pci Dss 3.2 Edition, 2017 Revision) by Yves B Desharnais 9780994837493

    RRP: £39.99
    Booksplease Price: £34.60
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780994837493Author Yves B DesharnaisFormat PaperbackPage Count 460Imprint 8850895 Canada Inc.Publisher 8850895 Canada Inc.Weight(grams) 789gDimensions(mm)...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £39.99
    Booksplease Price: £34.60
    Subtotal:
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh 9780470613030

    Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh 9780470613030

    Booksplease Price: £50.44
    A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £50.44
    Subtotal:
  • Snort Intrusion Detection and Prevention Toolkit by Brian Caswell 9781597490993

    Snort Intrusion Detection and Prevention Toolkit by Brian Caswell 9781597490993

    Booksplease Price: £47.08
    This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £47.08
    Subtotal:
  • The Tao of Open Source Intelligence by Stewart K. Bertram 9781849287289

    The Tao of Open Source Intelligence by Stewart K. Bertram 9781849287289

    RRP: £37.95
    Booksplease Price: £34.69
    OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.The Tao of Open Source Intelligence is your guide to the...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £37.95
    Booksplease Price: £34.69
    Subtotal:
  • Scada Security: What's Broken and How to Fix It by Andrew Ginter 9780995298408

    Scada Security: What's Broken and How to Fix It by Andrew Ginter 9780995298408

    Booksplease Price: £23.29
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780995298408Author Andrew GinterFormat PaperbackPage Count 180Imprint Scada Security - What's Broken and How to Fix ItPublisher Scada Security - What's...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £23.29
    Subtotal:
  • Cryptography and Security Services: Mechanisms and Applications by Manuel Mogollon 9781599048376

    Cryptography and Security Services: Mechanisms and Applications by Manuel Mogollon 9781599048376

    RRP: £104.00
    Booksplease Price: £81.50
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781599048376Author Manuel MogollonFormat HardbackPage Count 456Imprint CyberTech PublishingPublisher IGI GlobalWeight(grams) 1112g
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £104.00
    Booksplease Price: £81.50
    Subtotal:
  • Implementing Azure: Putting Modern DevOps to Use: Transform your software deployment process with Microsoft Azure by Florian Klaffenbach 9781788833936

    Implementing Azure: Putting Modern DevOps to Use: Transform your software deployment process with Microsoft Azure by Florian Klaffenbach 9781788833936

    Booksplease Price: £40.99
    Explore powerful Azure DevOps solutions to develop and deploy your software faster and more efficiently.Key FeaturesBuild modern microservice-based systems with Azure architectureLearn to deploy and manage cloud services and virtual machinesConfigure...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £40.99
    Subtotal:
  • Hardening Cisco Routers Thomas Akin 9780596001667

    Hardening Cisco Routers Thomas Akin 9780596001667

    RRP: £19.99
    Booksplease Price: £15.24
    Network administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This book focuses on ways to secure Cisco routers, it is a reference for protecting the protectors...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £19.99
    Booksplease Price: £15.24
    Subtotal:
  • Introduction to Network Security Douglas Jacobson 9781584885436

    Introduction to Network Security Douglas Jacobson 9781584885436

    RRP: £105.00
    Booksplease Price: £92.67
    Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £105.00
    Booksplease Price: £92.67
    Subtotal:
  • Cyberwar and Revolution: Digital Subterfuge in Global Capitalism by Nick Dyer-Witheford 9781517904111

    Cyberwar and Revolution: Digital Subterfuge in Global Capitalism by Nick Dyer-Witheford 9781517904111

    RRP: £18.99
    Booksplease Price: £16.68
    Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £18.99
    Booksplease Price: £16.68
    Subtotal:
  • Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management by Anton Chuvakin 9781597496353

    Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management by Anton Chuvakin 9781597496353

    Booksplease Price: £43.26
    Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £43.26
    Subtotal:
  • Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication by Holger Kaschner 9783658354886

    Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication by Holger Kaschner 9783658354886

    RRP: £64.99
    Booksplease Price: £61.04
    Cyber attacks and IT breakdowns threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £64.99
    Booksplease Price: £61.04
    Subtotal:
  • Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James Foster 9781597490054

    Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James Foster 9781597490054

    Booksplease Price: £47.08
    The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £47.08
    Subtotal:
  • Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches by Yoram Orzach 9781789953480

    Network Protocols for Security Professionals: Probe and identify network-based vulnerabilities and safeguard against network protocol breaches by Yoram Orzach 9781789953480

    Booksplease Price: £39.39
    Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS,...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £39.39
    Subtotal:
  • Cybercrime Investigations: A Comprehensive Resource for Everyone John Bandler 9781032399980

    Cybercrime Investigations: A Comprehensive Resource for Everyone John Bandler 9781032399980

    RRP: £49.99
    Booksplease Price: £44.79
    Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £49.99
    Booksplease Price: £44.79
    Subtotal:
  • SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks by Ettore Galluccio 9781839215643

    SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks by Ettore Galluccio 9781839215643

    Booksplease Price: £29.78
    Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey FeaturesUnderstand SQL injection and its effects on websites and other systemsGet hands-on with SQL...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: £29.78
    Subtotal:
  • Steganography by Karen Bailey 9781594576676

    Steganography by Karen Bailey 9781594576676

    RRP: £9.99
    Booksplease Price: £8.98
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781594576676Author Karen BaileyFormat PaperbackPage Count 120Imprint Booksurge PublishingPublisher Booksurge PublishingWeight(grams) 172gDimensions(mm)...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £9.99
    Booksplease Price: £8.98
    Subtotal:
  • Security and Usability by Lorrie Faith Cranor

    Security and Usability by Lorrie Faith Cranor

    RRP: £39.99
    Booksplease Price: £30.09
    Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues - both because they often failed to recognize the importance of human...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £39.99
    Booksplease Price: £30.09
    Subtotal:
  • Hacking the Human: Social Engineering Techniques and Security Countermeasures Ian Mann 9781138357044

    Hacking the Human: Social Engineering Techniques and Security Countermeasures Ian Mann 9781138357044

    RRP: £33.99
    Booksplease Price: £31.52
    Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £33.99
    Booksplease Price: £31.52
    Subtotal:
  • IoT Penetration Testing Cookbook by Aaron Guzman 9781787280571

    IoT Penetration Testing Cookbook by Aaron Guzman 9781787280571

    RRP: £32.99
    Booksplease Price: £32.80
    Over 80 recipes to master IoT security techniques. About This Book * Identify vulnerabilities in IoT device architectures and firmware using software and hardware pentesting techniques * Understand radio communication analysis with concepts such...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £32.99
    Booksplease Price: £32.80
    Subtotal:
  • Total: items /

Adding your books to cart