Recently Viewed

General

Filter By

Sort By:

Display Type:
Filters
  • Book
  • Qty in Cart
  • Quantity
  • Price
  • Subtotal
  • Risk Management for Computer Security: Protecting Your Network and Information Assets by Andy Jones 9780750677950

    Risk Management for Computer Security: Protecting Your Network and Information Assets by Andy Jones 9780750677950

    Booksplease Price: €55.95
    Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €55.95
    Subtotal:
  • Foundations of Security: What Every Programmer Needs to Know by Christoph Kern 9781590597842

    Foundations of Security: What Every Programmer Needs to Know by Christoph Kern 9781590597842

    RRP: €77.34
    Booksplease Price: €56.16
    Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €77.34
    Booksplease Price: €56.16
    Subtotal:
  • Reliability and Availability of Cloud Computing by Eric Bauer 9781118177013

    Reliability and Availability of Cloud Computing by Eric Bauer 9781118177013

    RRP: €92.76
    Booksplease Price: €81.31
    A holistic approach to service reliability and availability of cloud computing Reliability and Availability of Cloud Computing provides IS/IT system and solution architects, developers, and engineers with the knowledge needed to assess the impact of...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €92.76
    Booksplease Price: €81.31
    Subtotal:
  • Mastering Kali Linux for Advanced Penetration Testing - by Vijay Kumar Velu 9781787120235

    Mastering Kali Linux for Advanced Penetration Testing - by Vijay Kumar Velu 9781787120235

    Booksplease Price: €51.16
    A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book * Employ advanced pentesting techniques with Kali Linux to build highly-secured systems * Get to grips...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €51.16
    Subtotal:
  • The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic by Robert Shimonski 9780124104136

    The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic by Robert Shimonski 9780124104136

    RRP: €30.93
    Booksplease Price: €28.91
    The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €30.93
    Booksplease Price: €28.91
    Subtotal:
  • The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Derrick Rountree 9780124059320

    The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Derrick Rountree 9780124059320

    RRP: €30.93
    Booksplease Price: €21.11
    As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €30.93
    Booksplease Price: €21.11
    Subtotal:
  • Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury 9783031121661

    Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury 9783031121661

    Booksplease Price: €60.45
    This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €60.45
    Subtotal:
  • Introduction to Machine Learning with Applications in Information Security by Mark Stamp

    Introduction to Machine Learning with Applications in Information Security by Mark Stamp

    Booksplease Price: €68.94
    Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn't prove...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €68.94
    Subtotal:
  • Big Data Analytics in Cybersecurity Onur Savas (Intelligent Automation, Inc., Rockville, Maryland, USA) 9781032096360

    Big Data Analytics in Cybersecurity Onur Savas (Intelligent Automation, Inc., Rockville, Maryland, USA) 9781032096360

    RRP: €55.92
    Booksplease Price: €49.88
    Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €55.92
    Booksplease Price: €49.88
    Subtotal:
  • The Complete Guide to Cybersecurity Risks and Controls Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA) 9781032402550

    The Complete Guide to Cybersecurity Risks and Controls Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA) 9781032402550

    RRP: €53.54
    Booksplease Price: €47.87
    The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €53.54
    Booksplease Price: €47.87
    Subtotal:
  • iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew Hoog 9781597496599

    iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew Hoog 9781597496599

    RRP: €60.68
    Booksplease Price: €55.87
    iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €60.68
    Booksplease Price: €55.87
    Subtotal:
  • The Database Hacker's Handbook: Defending Database Servers David Litchfield 9780764578014

    The Database Hacker's Handbook: Defending Database Servers David Litchfield 9780764578014

    RRP: €38.07
    Booksplease Price: €26.10
    Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €38.07
    Booksplease Price: €26.10
    Subtotal:
  • Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber

    Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber

    RRP: €77.34
    Booksplease Price: €63.88
    See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €77.34
    Booksplease Price: €63.88
    Subtotal:
  • Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications by Sanjib Sinha 9781484253908

    Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications by Sanjib Sinha 9781484253908

    RRP: €59.49
    Booksplease Price: €45.08
    Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €59.49
    Booksplease Price: €45.08
    Subtotal:
  • Cyber Dragon: Inside China's Information Warfare and Cyber Operations by Dean Cheng 9781440835643

    Cyber Dragon: Inside China's Information Warfare and Cyber Operations by Dean Cheng 9781440835643

    Booksplease Price: €67.06
    This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €67.06
    Subtotal:
  • Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response by Leighton Johnson 9781597499965

    Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response by Leighton Johnson 9781597499965

    RRP: €52.35
    Booksplease Price: €48.60
    Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €52.35
    Booksplease Price: €48.60
    Subtotal:
  • Access Control, Security, and Trust: A Logical Approach Shiu-Kai Chin 9781584888628

    Access Control, Security, and Trust: A Logical Approach Shiu-Kai Chin 9781584888628

    RRP: €136.85
    Booksplease Price: €118.48
    Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €136.85
    Booksplease Price: €118.48
    Subtotal:
  • The IoT Architect's Guide to Attainable Security and Privacy Damilare D. Fagbemi 9781032475233

    The IoT Architect's Guide to Attainable Security and Privacy Damilare D. Fagbemi 9781032475233

    RRP: €53.54
    Booksplease Price: €47.87
    This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €53.54
    Booksplease Price: €47.87
    Subtotal:
  • Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud by Bradley Fowler 9781484297414

    Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud by Bradley Fowler 9781484297414

    RRP: €59.49
    Booksplease Price: €38.91
    Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €59.49
    Booksplease Price: €38.91
    Subtotal:
  • Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition by Preston Miller 9781789341690

    Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition by Preston Miller 9781789341690

    Booksplease Price: €44.39
    Design, develop, and deploy innovative forensic solutions using Python Key Features Discover how to develop Python scripts for effective digital forensic analysis Master the skills of parsing complex data structures with Python libraries Solve forensic...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €44.39
    Subtotal:
  • Advanced Persistent Training: Take Your Security Awareness Program to the Next Level by Jordan Schroeder 9781484228340

    Advanced Persistent Training: Take Your Security Awareness Program to the Next Level by Jordan Schroeder 9781484228340

    RRP: €59.49
    Booksplease Price: €48.84
    Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €59.49
    Booksplease Price: €48.84
    Subtotal:
  • Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems by Furqan Khan 9781788990820

    Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems by Furqan Khan 9781788990820

    Booksplease Price: €38.63
    Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with PythonLearn custom exploit development .Make robust and powerful cybersecurity tools with PythonBook...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €38.63
    Subtotal:
  • Ransomware and Cybercrime Andrew Jenkinson 9781032235509

    Ransomware and Cybercrime Andrew Jenkinson 9781032235509

    RRP: €38.07
    Booksplease Price: €34.16
    In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €38.07
    Booksplease Price: €34.16
    Subtotal:
  • Cybersecurity and Applied Mathematics by Leigh Metcalf 9780128044520

    Cybersecurity and Applied Mathematics by Leigh Metcalf 9780128044520

    RRP: €60.68
    Booksplease Price: €55.51
    Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €60.68
    Booksplease Price: €55.51
    Subtotal:
  • Introductory Computer Forensics: A Hands-on Practical Approach by Xiaodong Lin 9783030005801

    Introductory Computer Forensics: A Hands-on Practical Approach by Xiaodong Lin 9783030005801

    Booksplease Price: €121.62
    This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €121.62
    Subtotal:
  • Secrets of a Cyber Security Architect Brook S. E. Schoenfield 9781498741996

    Secrets of a Cyber Security Architect Brook S. E. Schoenfield 9781498741996

    RRP: €73.77
    Booksplease Price: €64.93
    Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?Cyber security is a...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €73.77
    Booksplease Price: €64.93
    Subtotal:
  • Learning Python Web Penetration Testing: Automate web penetration testing activities using Python by Christian Martorella 9781789533972

    Learning Python Web Penetration Testing: Automate web penetration testing activities using Python by Christian Martorella 9781789533972

    Booksplease Price: €30.76
    Leverage the simplicity of Python and available libraries to build web security testing tools for your application Key Features Understand the web application penetration testing methodology and toolkit using Python Write a web crawler/spider with the...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €30.76
    Subtotal:
  • PCI DSS made easy: (PCI DSS 3.2.1 Edition) by Francois Desharnais 9781999464400

    PCI DSS made easy: (PCI DSS 3.2.1 Edition) by Francois Desharnais 9781999464400

    RRP: €47.59
    Booksplease Price: €39.19
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781999464400Author Francois DesharnaisFormat PaperbackPage Count 460Imprint 8850895 Canada Inc.Publisher 8850895 Canada Inc.Weight(grams) 793gDimensions(mm)...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €47.59
    Booksplease Price: €39.19
    Subtotal:
  • Penetration Testing Step By Step Guide by Radhi Shatob 9781999541248

    Penetration Testing Step By Step Guide by Radhi Shatob 9781999541248

    RRP: €105.91
    Booksplease Price: €80.84
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781999541248Author Radhi ShatobFormat PaperbackPage Count 378Imprint Radhi ShatobPublisher Radhi ShatobWeight(grams) 152g
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €105.91
    Booksplease Price: €80.84
    Subtotal:
  • Identity Patterns and Strategies for Enterprise: Design enterprise cloud identity model with Oauth 2.0 and Active Directory by Giuseppe Di Federico 9781801810845

    Identity Patterns and Strategies for Enterprise: Design enterprise cloud identity model with Oauth 2.0 and Active Directory by Giuseppe Di Federico 9781801810845

    Booksplease Price: €33.47
    Get to grips with identity patterns and design a structured enterprise identity model for cloud applicationsKey FeaturesLearn all you need to know about different identity patterns and implementing them in real-world scenariosHandle multi-IDP-related...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €33.47
    Subtotal:
  • Cyber Crime and Cyber Terrorism Investigator's Handbook by Professor Babak Akhgar 9780128007433

    Cyber Crime and Cyber Terrorism Investigator's Handbook by Professor Babak Akhgar 9780128007433

    RRP: €47.59
    Booksplease Price: €43.68
    Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €47.59
    Booksplease Price: €43.68
    Subtotal:
  • Narco-Cults: Understanding the Use of Afro-Caribbean and Mexican Religious Cultures in the Drug Wars Tony M. Kail 9781466595453

    Narco-Cults: Understanding the Use of Afro-Caribbean and Mexican Religious Cultures in the Drug Wars Tony M. Kail 9781466595453

    RRP: €73.77
    Booksplease Price: €64.93
    Those who know about how spirituality plays into the world of drug smuggling have likely heard of Santa Muerte, Jesus Malverde, and Santeria, but the details of the more obscure African religions and Latin American folk saints and cults often remain a...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €73.77
    Booksplease Price: €64.93
    Subtotal:
  • Buffer Overflow Attacks: Detect, Exploit, Prevent by Jason Deckard 9781932266672

    Buffer Overflow Attacks: Detect, Exploit, Prevent by Jason Deckard 9781932266672

    RRP: €34.50
    Booksplease Price: €32.34
    The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €34.50
    Booksplease Price: €32.34
    Subtotal:
  • X-Ways Forensics Practitioner's Guide by Brett Shavers 9780124116054

    X-Ways Forensics Practitioner's Guide by Brett Shavers 9780124116054

    RRP: €55.92
    Booksplease Price: €51.35
    The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €55.92
    Booksplease Price: €51.35
    Subtotal:
  • Low Tech Hacking: Street Smarts for Security Professionals by Jack Wiles 9781597496650

    Low Tech Hacking: Street Smarts for Security Professionals by Jack Wiles 9781597496650

    RRP: €47.59
    Booksplease Price: €33.20
    Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €47.59
    Booksplease Price: €33.20
    Subtotal:
  • Wireless Mobile Internet Security by Man Young Rhee 9781118496534

    Wireless Mobile Internet Security by Man Young Rhee 9781118496534

    RRP: €111.80
    Booksplease Price: €110.36
    The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €111.80
    Booksplease Price: €110.36
    Subtotal:
  • Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR by Guven Boyraz 9781835463260

    Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR by Guven Boyraz 9781835463260

    Booksplease Price: €36.52
    Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategy Key Features Learn how to tackle endpoint security problems in your...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €36.52
    Subtotal:
  • How to Cheat at Managing Information Security by Mark Osborne 9781597491105

    How to Cheat at Managing Information Security by Mark Osborne 9781597491105

    Booksplease Price: €42.14
    This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €42.14
    Subtotal:
  • Mobile Forensics - Advanced Investigative Strategies by Oleg Afonin 9781786464484

    Mobile Forensics - Advanced Investigative Strategies by Oleg Afonin 9781786464484

    Booksplease Price: €49.19
    Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book * A straightforward guide to address the roadblocks face when doing mobile forensics * Simplify mobile forensics using the right mix of methods,...
    Qty in Cart: 0
    Quantity:
    Price:
    Booksplease Price: €49.19
    Subtotal:
  • Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance by National Academies of Sciences, Engineering, and Medicine 9780309713207

    Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance by National Academies of Sciences, Engineering, and Medicine 9780309713207

    RRP: €39.27
    Booksplease Price: €33.69
    Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforcement investigations to identifying potential security threats at large venues. However, advances in this technology have outpaced...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: €39.27
    Booksplease Price: €33.69
    Subtotal:
  • Total: items /

Adding your books to cart