Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
The Browser Hacker's Handbook Wade Alcorn 9781118662090
RRP: $94.50Booksplease Price: $86.84Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks... -
The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity Tine Munk (Nottingham Trent University, UK) 9780367648701
RRP: $94.48Booksplease Price: $85.97This book outlines the complexity in understanding different forms of cyber attacks, the actors involved, and their motivations. It explores the key challenges in investigating and prosecuting politically motivated cyber attacks, the lack of consistency... -
Gray Hat C: A Hacker's Guide to Creating and Automating Security Tools by Brandon Perry
RRP: $100.78Booksplease Price: $62.62Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run... -
Build a Security Culture by Kai Roer 9781849287166
RRP: $35.60Booksplease Price: $33.73Understand how to create a culture that promotes cyber security within the workplace. Using his own experiences, the author highlights the underlying cause for many successful and easily preventable attacks.Understand how to create a culture that... -
Windows Performance Analysis Field Guide by Clint Huffman 9780124167018
RRP: $77.68Booksplease Price: $73.48Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide... -
This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers by Andy Greenberg 9780142180495
RRP: $50.40Booksplease Price: $42.00Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780142180495Author Andy GreenbergFormat PaperbackPage Count 400Imprint PlumePublisher Penguin Putnam IncWeight(grams) 323gDimensions(mm) 203mm * 135mm * 23mm -
The Social Engineer's Playbook: A Practical Guide to Pretexting by Jeremiah Talamantes 9780692306611
RRP: $35.89Booksplease Price: $31.52Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780692306611Author Jeremiah TalamantesFormat PaperbackPage Count 202Imprint Hexcode PublishingPublisher Hexcode PublishingWeight(grams) 277gDimensions(mm)... -
Defending APIs against Cyber Attack: Learn the secrets of defense techniques to build secure application programming interfaces by Colin Domoney 9781804617120
Booksplease Price: $79.46Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on security Learn the tools... -
A Vulnerable System: The History of Information Security in the Computer Age by Andrew J. Stewart 9781501758942
RRP: $58.78Booksplease Price: $49.08As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our... -
Authentication Codes and Combinatorial Designs by Dingyi Pei 9780367391249
RRP: $142.78Booksplease Price: $127.37Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on... -
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage by Timo Steffens 9783662613153
RRP: $125.98Booksplease Price: $117.85An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their... -
How To Create a Web3 Startup: A Guide for Tomorrow's Breakout Companies by Tom Taulli 9781484286821
RRP: $83.98Booksplease Price: $56.72Web3 is the next evolution for the World Wide Web based on Blockchain technology. This book will equip entrepreneurs with the best preparation for the megatrend of Web3 by reviewing its core concepts such as DAOs, tokens, dApps, and Ethereum.With Web2,... -
Building and Automating Penetration Testing Labs in the Cloud: Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP by Joshua Arvin Lat 9781837632398
Booksplease Price: $84.80Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCP Key Features Explore strategies for managing the complexity, cost, and security of... -
Hands-On Red Team Tactics: A practical guide to mastering Red Team operations by Himanshu Sharma 9781788995238
Booksplease Price: $77.15Your one-stop guide to learning and implementing Red Team tactics effectivelyKey FeaturesTarget a complex enterprise environment in a Red Team activityDetect threats and respond to them with a real-world cyber-attack simulationExplore advanced... -
Sudo Mastery by Michael W Lucas 9781642350302
RRP: $52.48Booksplease Price: $43.47Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781642350302Author Michael W LucasFormat PaperbackPage Count 210Imprint Tilted Windmill PressPublisher Tilted Windmill PressWeight(grams) 286gDimensions(mm)... -
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry by Harlan Carvey 9780128032916
RRP: $115.48Booksplease Price: $106.09Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the... -
Policy Design in the Age of Digital Adoption: Explore how PolicyOps can drive policy-as-code adoption in an organizations' digital transformation by Ricardo Ferreira 9781801811743
RRP: $94.48Booksplease Price: $82.99A proven methodology to build a PolicyOps function and public policy design frameworks for digital adoption, supporting your organization's journey into new paradigms and service models such as Cloud, SaaS, CaaS, FaaS, and DevOpsKey FeaturesUnderstand... -
EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide by Steve Bunting 9780470901069
RRP: $115.50Booksplease Price: $84.46The official, Guidance Software-approved book on the newest EnCE exam! The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase... -
A Practical Guide to Managing Information Security by Steve Purser 9781580537025
Booksplease Price: $174.30This guidebook helps professionals to master the management of information security, concentrating on the proactive development and implementation of IT security for the enterprise.Book InformationISBN 9781580537025Author Steve PurserFormat HardbackPage... -
On Cyber: Towards an Operational Art for Cyber Conflict by David Raymond 9780692911563
RRP: $73.50Booksplease Price: $61.32Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780692911563Author David RaymondFormat PaperbackPage Count 354Imprint Kopidion PressPublisher Kopidion PressWeight(grams) 472gDimensions(mm) 229mm * 152mm *... -
Ethical Hacker’s Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks by Samir Kumar Rakshit 9789355512154
RRP: $62.98Booksplease Price: $51.72Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9789355512154Author Samir Kumar RakshitFormat PaperbackPage Count 472Imprint BPB PublicationsPublisher BPB PublicationsDimensions(mm) 240mm * 190mm * 30mm -
Applied Cryptanalysis: Breaking Ciphers in the Real World by Mark Stamp 9780470114865
RRP: $222.50Booksplease Price: $194.59The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function... -
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings by Joaquin Garcia-Alfaro 9783030003043
Booksplease Price: $139.15This book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd... -
Practical Vulnerability Management by Andrew Magnusson
RRP: $60.88Booksplease Price: $37.88Vulnerability management is a critical and sometimes neglected aspect of information security. It consists of two main parts: awareness and action. First, the security practitioner must be aware of the vulnerabilities that exist in an organisation's... -
Managing Risk and Information Security: Protect to Enable by Malcolm W. Harkins 9781484214565
Booksplease Price: $52.79Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples... -
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies by Carey Parker 9781484290354
RRP: $69.28Booksplease Price: $51.18Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book... -
Incident Response for Windows: Adapt effective strategies for managing sophisticated cyber attacks targeting Windows systems Anatoly Tykushin 9781804619322
Booksplease Price: $66.19Get to grips with modern sophisticated attacks, their intrusion life cycles, and the key motivations of adversaries, and build the most effective cybersecurity incident preparedness, response, remediation, and prevention methodologies Key Features ... -
Java Cryptography Jonathon Knudsen 9781565924024
RRP: $75.58Booksplease Price: $56.47Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects... -
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication by Robert W. Gehl
RRP: $56.70Booksplease Price: $51.66Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262543453Author Robert W. GehlFormat PaperbackPage Count 304Imprint MIT PressPublisher MIT Press Ltd -
Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition by David Zientara 9781788993173
Booksplease Price: $95.76Install and configure a pfSense router/firewall, and become a pfSense expert in the process. About This Book * You can always do more to secure your software - so extend and customize your pfSense firewall * Build a high availability security... -
Cyber Strategy: Risk-Driven Security and Resiliency by Carol Siegel
RRP: $88.18Booksplease Price: $79.78Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts... -
The Tangled Web by Michal Zalewski 9781593273880
RRP: $119.68Booksplease Price: $73.33Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle... -
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations by Morey J. Haber
RRP: $83.98Booksplease Price: $61.17Build an effective vulnerability management strategy to protect your organization's assets, applications, and data.Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern... -
Python Digital Forensics Cookbook by Preston Miller 9781783987467
Booksplease Price: $85.43Over 60 recipes to help you learn digital forensics and leverage Python scripts to amplify your examinations About This Book * Develop code that extracts vital information from everyday forensic acquisitions. * Increase the quality and efficiency... -
Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations by Robert J. Girod
RRP: $75.58Booksplease Price: $69.78All too often, professional investigations fail because those involved jump to conclusions and draw faulty premises that leave the trail cold. Correct conclusions are not the result of guessing, but by applying efficient thought processes. Logical... -
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition by Jayson E. Street 9781597495684
RRP: $50.38Booksplease Price: $37.38Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network," tells the fictional story of Bob and Leon, two kids caught up in an... -
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis by Mark Talabis 9781597497350
RRP: $83.98Booksplease Price: $60.86In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to... -
Routledge Handbook of Surveillance Studies Kirstie Ball 9781138026025
RRP: $138.58Booksplease Price: $123.25Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both... -
Trusted Data: A New Framework for Identity and Data Sharing by Thomas Hardjono 9780262043212
Booksplease Price: $61.55Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262043212Author Thomas HardjonoFormat PaperbackPage Count 400Imprint MIT PressPublisher MIT Press LtdDimensions(mm) 203mm * 137mm * 24mm -
Snowflake Security: Securing Your Snowflake Data Cloud by Ben Herzberg 9781484273883
RRP: $104.98Booksplease Price: $68.31This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of...