Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Practical OPNsense by Markus Stubbig 9783738632019
RRP: $51.68Booksplease Price: $47.60Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9783738632019Author Markus StubbigFormat PaperbackPage Count 360Imprint Books on DemandPublisher Books on DemandWeight(grams) 644gDimensions(mm) 246mm *... -
Cybersecurity Law, Standards and Regulations: 2nd Edition by Tari Schreider 9781944480561
RRP: $175.48Booksplease Price: $140.61Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781944480561Author Tari SchreiderFormat PaperbackPage Count 326Imprint Rothstein PublishingPublisher Rothstein PublishingWeight(grams) 757g -
The Peter Rabbit Passwordbook / Password Logbook by Beatrix Potter 9783752866575
RRP: $13.46Booksplease Price: $12.50Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9783752866575Author Beatrix PotterFormat PaperbackPage Count 62Imprint Books on DemandPublisher Books on DemandWeight(grams) 127g -
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress 9780124166721
RRP: $58.48Booksplease Price: $54.11Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of... -
XSS Attacks: Cross Site Scripting Exploits and Defense by Anton Rager 9781597491549
Booksplease Price: $117.96A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It... -
Cyberdanger: Understanding and Guarding Against Cybercrime by Eddy Willems 9783030045302
Booksplease Price: $40.97This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that... -
Writing Security Tools and Exploits by James Foster
RRP: $74.08Booksplease Price: $72.35Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated... -
IT Security Risk Control Management: An Audit Preparation Plan by Raymond Pompon
RRP: $107.23Booksplease Price: $93.07Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.Information security is more than configuring... -
The Design of Rijndael: AES - The Advanced Encryption Standard by Joan Daemen 9783540425809
Booksplease Price: $156.16Rijndael was the surprise winner of the contest for the new Advanced En cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be ginning in January 1997; Rijndael... -
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value by Michelle Dennedy 9781430263555
Booksplease Price: $80.03"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy... -
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography by Arno Mittelbach 9783030632892
Booksplease Price: $109.02Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption... -
Cyber-Physical Attacks: A Growing Invisible Threat by George Loukas 9780128012901
RRP: $72.13Booksplease Price: $65.93Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it... -
Complete Guide to CISM Certification Thomas R. Peltier 9780849353567
RRP: $191.08Booksplease Price: $166.18The Certified Information Security Manager (R)(CISM (R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA (R)). It has been designed specifically for experienced information security managers and those... -
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources by Morey J. Haber
RRP: $107.23Booksplease Price: $99.65Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus-it is not a matter of if, but rather when an organization will be breached. Threat... -
Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp
RRP: $74.10Booksplease Price: $66.01For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum... -
A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities by Sagar Rahalkar 9781484264010
RRP: $77.98Booksplease Price: $62.36Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet... -
The Data Protection Officer: Profession, Rules, and Role Paul Lambert 9781138031937
RRP: $253.50Booksplease Price: $222.50The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and... -
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin by Paul C. van Oorschot 9783030834104
RRP: $107.23Booksplease Price: $91.57This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a... -
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities by Benjamin Strout 9781803238876
Booksplease Price: $54.19Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your workKey FeaturesBuild successful strategies for planning and executing zero-day... -
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Tyson Macaulay 9781439801963
RRP: $161.83Booksplease Price: $140.93As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of... -
Fire Doesn't Innovate: The Executive's Practical Guide to Thriving in the Face of Evolving Cyber Risks by Kip Boyle 9781544513195
RRP: $29.66Booksplease Price: $26.50Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781544513195Author Kip BoyleFormat PaperbackPage Count 266Imprint Lioncrest PublishingPublisher Lioncrest PublishingWeight(grams) 340g -
Privacy Is Hard and Seven Other Myths: Achieving Privacy Through Careful Design by Jaap-Henk Hoepman
RRP: $52.65Booksplease Price: $34.32Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262045827Author Jaap-Henk HoepmanFormat HardbackPage Count 256Imprint MIT PressPublisher MIT Press Ltd -
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition by Shiva V. N Parasram 9781789341768
Booksplease Price: $72.74Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore... -
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing by Rithik Chatterjee 9781484264331
RRP: $77.98Booksplease Price: $62.36Use Red Hat's security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and... -
Risk Management for Computer Security: Protecting Your Network and Information Assets by Andy Jones 9780750677950
Booksplease Price: $91.69Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk... -
Foundations of Security: What Every Programmer Needs to Know by Christoph Kern 9781590597842
RRP: $126.73Booksplease Price: $92.02Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems... -
Reliability and Availability of Cloud Computing by Eric Bauer 9781118177013
RRP: $152.00Booksplease Price: $146.21A holistic approach to service reliability and availability of cloud computing Reliability and Availability of Cloud Computing provides IS/IT system and solution architects, developers, and engineers with the knowledge needed to assess the impact of... -
Mastering Kali Linux for Advanced Penetration Testing - by Vijay Kumar Velu 9781787120235
Booksplease Price: $83.83A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book * Employ advanced pentesting techniques with Kali Linux to build highly-secured systems * Get to grips... -
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic by Robert Shimonski 9780124104136
RRP: $50.68Booksplease Price: $47.37The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature... -
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Derrick Rountree 9780124059320
RRP: $50.68Booksplease Price: $34.59As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear... -
Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury 9783031121661
Booksplease Price: $99.06This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal... -
Introduction to Machine Learning with Applications in Information Security by Mark Stamp
Booksplease Price: $112.96Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn't prove... -
Big Data Analytics in Cybersecurity Onur Savas (Intelligent Automation, Inc., Rockville, Maryland, USA) 9781032096360
RRP: $91.63Booksplease Price: $81.74Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of... -
The Complete Guide to Cybersecurity Risks and Controls Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA) 9781032402550
RRP: $87.73Booksplease Price: $78.45The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will... -
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew Hoog 9781597496599
RRP: $99.43Booksplease Price: $91.55iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the... -
The Database Hacker's Handbook: Defending Database Servers David Litchfield 9780764578014
RRP: $62.38Booksplease Price: $45.69Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database... -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber
RRP: $126.73Booksplease Price: $104.68See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your... -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications by Sanjib Sinha 9781484253908
RRP: $97.48Booksplease Price: $73.87Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move... -
Cyber Dragon: Inside China's Information Warfare and Cyber Operations by Dean Cheng 9781440835643
Booksplease Price: $109.88This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing... -
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response by Leighton Johnson 9781597499965
RRP: $85.78Booksplease Price: $79.64Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and...