Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Risk Management for Computer Security: Protecting Your Network and Information Assets by Andy Jones 9780750677950
Booksplease Price: €55.95Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk... -
Foundations of Security: What Every Programmer Needs to Know by Christoph Kern 9781590597842
RRP: €77.34Booksplease Price: €56.16Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems... -
Reliability and Availability of Cloud Computing by Eric Bauer 9781118177013
RRP: €92.76Booksplease Price: €81.31A holistic approach to service reliability and availability of cloud computing Reliability and Availability of Cloud Computing provides IS/IT system and solution architects, developers, and engineers with the knowledge needed to assess the impact of... -
Mastering Kali Linux for Advanced Penetration Testing - by Vijay Kumar Velu 9781787120235
Booksplease Price: €51.16A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book * Employ advanced pentesting techniques with Kali Linux to build highly-secured systems * Get to grips... -
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic by Robert Shimonski 9780124104136
RRP: €30.93Booksplease Price: €28.91The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature... -
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Derrick Rountree 9780124059320
RRP: €30.93Booksplease Price: €21.11As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear... -
Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury 9783031121661
Booksplease Price: €60.45This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal... -
Introduction to Machine Learning with Applications in Information Security by Mark Stamp
Booksplease Price: €68.94Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn't prove... -
Big Data Analytics in Cybersecurity Onur Savas (Intelligent Automation, Inc., Rockville, Maryland, USA) 9781032096360
RRP: €55.92Booksplease Price: €49.88Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of... -
The Complete Guide to Cybersecurity Risks and Controls Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA) 9781032402550
RRP: €53.54Booksplease Price: €47.87The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will... -
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew Hoog 9781597496599
RRP: €60.68Booksplease Price: €55.87iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the... -
The Database Hacker's Handbook: Defending Database Servers David Litchfield 9780764578014
RRP: €38.07Booksplease Price: €26.10Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database... -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber
RRP: €77.34Booksplease Price: €63.88See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your... -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications by Sanjib Sinha 9781484253908
RRP: €59.49Booksplease Price: €45.08Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move... -
Cyber Dragon: Inside China's Information Warfare and Cyber Operations by Dean Cheng 9781440835643
Booksplease Price: €67.06This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing... -
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response by Leighton Johnson 9781597499965
RRP: €52.35Booksplease Price: €48.60Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and... -
Access Control, Security, and Trust: A Logical Approach Shiu-Kai Chin 9781584888628
RRP: €136.85Booksplease Price: €118.48Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security... -
The IoT Architect's Guide to Attainable Security and Privacy Damilare D. Fagbemi 9781032475233
RRP: €53.54Booksplease Price: €47.87This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent... -
Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud by Bradley Fowler 9781484297414
RRP: €59.49Booksplease Price: €38.91Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology's recommendations. This book will show you how to implement information assurance risk management strategies within... -
Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition by Preston Miller 9781789341690
Booksplease Price: €44.39Design, develop, and deploy innovative forensic solutions using Python Key Features Discover how to develop Python scripts for effective digital forensic analysis Master the skills of parsing complex data structures with Python libraries Solve forensic... -
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level by Jordan Schroeder 9781484228340
RRP: €59.49Booksplease Price: €48.84Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to... -
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems by Furqan Khan 9781788990820
Booksplease Price: €38.63Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with PythonLearn custom exploit development .Make robust and powerful cybersecurity tools with PythonBook... -
Ransomware and Cybercrime Andrew Jenkinson 9781032235509
RRP: €38.07Booksplease Price: €34.16In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement... -
Cybersecurity and Applied Mathematics by Leigh Metcalf 9780128044520
RRP: €60.68Booksplease Price: €55.51Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical... -
Introductory Computer Forensics: A Hands-on Practical Approach by Xiaodong Lin 9783030005801
Booksplease Price: €121.62This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two... -
Secrets of a Cyber Security Architect Brook S. E. Schoenfield 9781498741996
RRP: €73.77Booksplease Price: €64.93Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?Cyber security is a... -
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python by Christian Martorella 9781789533972
Booksplease Price: €30.76Leverage the simplicity of Python and available libraries to build web security testing tools for your application Key Features Understand the web application penetration testing methodology and toolkit using Python Write a web crawler/spider with the... -
PCI DSS made easy: (PCI DSS 3.2.1 Edition) by Francois Desharnais 9781999464400
RRP: €47.59Booksplease Price: €39.19Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781999464400Author Francois DesharnaisFormat PaperbackPage Count 460Imprint 8850895 Canada Inc.Publisher 8850895 Canada Inc.Weight(grams) 793gDimensions(mm)... -
Penetration Testing Step By Step Guide by Radhi Shatob 9781999541248
RRP: €105.91Booksplease Price: €80.84Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781999541248Author Radhi ShatobFormat PaperbackPage Count 378Imprint Radhi ShatobPublisher Radhi ShatobWeight(grams) 152g -
Identity Patterns and Strategies for Enterprise: Design enterprise cloud identity model with Oauth 2.0 and Active Directory by Giuseppe Di Federico 9781801810845
Booksplease Price: €33.47Get to grips with identity patterns and design a structured enterprise identity model for cloud applicationsKey FeaturesLearn all you need to know about different identity patterns and implementing them in real-world scenariosHandle multi-IDP-related... -
Cyber Crime and Cyber Terrorism Investigator's Handbook by Professor Babak Akhgar 9780128007433
RRP: €47.59Booksplease Price: €43.68Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war... -
Narco-Cults: Understanding the Use of Afro-Caribbean and Mexican Religious Cultures in the Drug Wars Tony M. Kail 9781466595453
RRP: €73.77Booksplease Price: €64.93Those who know about how spirituality plays into the world of drug smuggling have likely heard of Santa Muerte, Jesus Malverde, and Santeria, but the details of the more obscure African religions and Latin American folk saints and cults often remain a... -
Buffer Overflow Attacks: Detect, Exploit, Prevent by Jason Deckard 9781932266672
RRP: €34.50Booksplease Price: €32.34The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon... -
X-Ways Forensics Practitioner's Guide by Brett Shavers 9780124116054
RRP: €55.92Booksplease Price: €51.35The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private... -
Low Tech Hacking: Street Smarts for Security Professionals by Jack Wiles 9781597496650
RRP: €47.59Booksplease Price: €33.20Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media... -
Wireless Mobile Internet Security by Man Young Rhee 9781118496534
RRP: €111.80Booksplease Price: €110.36The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete... -
Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR by Guven Boyraz 9781835463260
Booksplease Price: €36.52Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategy Key Features Learn how to tackle endpoint security problems in your... -
How to Cheat at Managing Information Security by Mark Osborne 9781597491105
Booksplease Price: €42.14This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do... -
Mobile Forensics - Advanced Investigative Strategies by Oleg Afonin 9781786464484
Booksplease Price: €49.19Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book * A straightforward guide to address the roadblocks face when doing mobile forensics * Simplify mobile forensics using the right mix of methods,... -
Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance by National Academies of Sciences, Engineering, and Medicine 9780309713207
RRP: €39.27Booksplease Price: €33.69Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforcement investigations to identifying potential security threats at large venues. However, advances in this technology have outpaced...