Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 by Harlan Carvey 9780124171572
RRP: £54.99Booksplease Price: £50.43Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live... -
Cyberwar, Cyberterror, Cybercrime: An In-Depth Guide to the Role of Standards in the Cybersecurity Environment by Julie E. Mehan 9781849285711
RRP: £37.95Booksplease Price: £33.81The intentions of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker are not the same. They can all cause serious problems for your organisation, however, including information theft, disruption of normal operations... -
Hacking with Python and Kali-Linux: Develop your own Hackingtools with Python in Kali-Linux by Alicia Noors 9783752686159
RRP: £22.90Booksplease Price: £21.06Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9783752686159Author Alicia NoorsFormat PaperbackPage Count 210Imprint Books on DemandPublisher Books on DemandWeight(grams) 386gDimensions(mm) 246mm * 189mm... -
Cybersecurity by Duane C Wilson
RRP: £15.99Booksplease Price: £10.04Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262542548Author Duane C. WilsonFormat PaperbackPage Count 160Imprint MIT PressPublisher MIT Press Ltd -
Adversarial Machine Learning by Anthony D. Joseph 9781107043466
RRP: £79.00Booksplease Price: £71.71Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively... -
Data Analytics for Internal Auditors by Richard E. Cascarino
RRP: £46.99Booksplease Price: £42.22There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The... -
Cybercrime Prevention: Theory and Applications by Russell Brewer
Booksplease Price: £55.68This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm... -
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats by Scott E. Donaldson
RRP: £64.99Booksplease Price: £55.78Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional... -
Digital Identity Phil Windley 9780596008789
RRP: £27.99Booksplease Price: £20.46The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many... -
Information Security Policies, Procedures, and Standards: A Practitioner's Reference Douglas J. Landoll (Lantego, LLC, Austin, Texas, USA) 9781482245899
RRP: £130.00Booksplease Price: £113.80Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and... -
Ransomware Revealed: A Beginner's Guide to Protecting and Recovering from Ransomware Attacks by Nihad A. Hassan 9781484242544
RRP: £39.99Booksplease Price: £30.69Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense... -
Swing Hacks Joshua Marinacci 9780596009076
RRP: £23.99Booksplease Price: £16.24"Swing Hacks" helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one... -
Hackable: How to Do Application Security Right by Ted Harrington 9781544517674
RRP: £21.99Booksplease Price: £15.91Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781544517674Author Ted HarringtonFormat HardbackPage Count 288Imprint Lioncrest PublishingPublisher Lioncrest PublishingWeight(grams) 152g -
Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom by Larry Daniel 9781597496438
RRP: £43.99Booksplease Price: £40.84Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors' years of experience in working with attorneys as digital forensics experts, common questions... -
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies by Ira Winkler 9780128093160
RRP: £36.99Booksplease Price: £33.81Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home... -
Microsoft 365 Mobility and Security - Exam Guide MS-101: Explore threat management, governance, security, compliance, and device services in Microsoft 365 by Nate Chamberlain 9781838984656
Booksplease Price: £29.13Get up to speed with planning, deploying, and managing Microsoft Office 365 services and gain the skills you need to pass the MS-101 exam Key Features Explore everything from mobile device management and compliance,through to data governance and auditing... -
Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers by Habtamu Abie 9783030697808
Booksplease Price: £36.07This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer... -
Security Engineering for Embedded and Cyber-Physical Systems by Saad Motahhir 9781032576473
RRP: £105.00Booksplease Price: £91.14Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leaders' agendas. Such a transformation stimulates innovation in new products and services, the digital transformation of processes, and the... -
Information Theoretic Security and Privacy of Information Systems by Holger Boche 9781107132269
RRP: £93.00Booksplease Price: £84.50Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading... -
Official (ISC)2 (R) Guide to the CAP (R) CBK (R) by Patrick D. Howard
RRP: £72.99Booksplease Price: £64.64Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified... -
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Jan Killmeyer (Tudor Engineering Management, Butler, Pennsylvania, USA) 9780849315497
RRP: £125.00Booksplease Price: £109.85Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security... -
CompTIA Security+ Guide to Network Security Fundamentals by Mark D. Ciampa 9781337288781
Booksplease Price: £86.09Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+... -
Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival by Brian John Heard 9780367869434
RRP: £33.99Booksplease Price: £30.37Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction:... -
Malware Forensic Field Guide for Unix Systems by James M. Aquilina 9781597494700
Booksplease Price: £50.61Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital... -
Obfuscation: A User's Guide for Privacy and Protest by Finn Brunton
RRP: £14.99Booksplease Price: £9.00Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262529860Author Finn BruntonFormat PaperbackPage Count 136Imprint MIT PressPublisher MIT Press LtdDimensions(mm) 203mm * 127mm * 10mm -
Advanced Cybersecurity Technologies by Ralph Moseley
RRP: £51.99Booksplease Price: £46.14Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human... -
How to Cheat at Windows System Administration Using Command Line Scripts by Pawan K. Bhardwaj 9781597491051
RRP: £32.99Booksplease Price: £30.65How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version... -
70 Tips and Tricks for Mastering the CISSP Exam by R. Sarma Danturthi
RRP: £54.99Booksplease Price: £44.76Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the... -
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition Frederick S. Calhoun (Threat Management Consultant, Arlington, Virginia, USA) 9781498721844
RRP: £82.99Booksplease Price: £72.27The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100... -
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats by Will Gragido 9781597496131
RRP: £43.99Booksplease Price: £30.82Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and... -
Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' by Eduardo Alberto Vela Nava 9781597496049
RRP: £39.99Booksplease Price: £28.20Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your... -
Digital Forensics: Threatscape and Best Practices by John Sammons 9780128045268
RRP: £36.99Booksplease Price: £33.81Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in... -
Malware Forensics: Investigating and Analyzing Malicious Code by Cameron H. Malin 9781597492683
RRP: £54.99Booksplease Price: £50.93Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and... -
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit by Sagar Rahalkar 9781484242698
RRP: £39.99Booksplease Price: £31.98Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the... -
The Cybersecurity to English Dictionary: 5th Edition by Raef Meeuwisse 9781911452409
RRP: £19.99Booksplease Price: £18.59Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781911452409Author Raef MeeuwisseFormat HardbackPage Count 164Imprint Cyber Simplicity LtdPublisher Cyber Simplicity LtdDimensions(mm) 203mm * 127mm * 11mm -
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace by Todd G. Shipley 9780124078178
RRP: £36.99Booksplease Price: £34.61Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step... -
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare Andrew Jenkinson 9781032068503
RRP: £31.99Booksplease Price: £28.71Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S.,... -
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python by Hussam Khrais 9781788838979
RRP: £24.99Booksplease Price: £24.88Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language Key Features Comprehensive information on building a web application penetration testing framework using... -
Security for Web Developers John Paul Mueller 9781491928646
RRP: £39.99Booksplease Price: £27.64As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new... -
Privacy and Big Data Terence Craig 9781449305000
RRP: £15.99Booksplease Price: £11.06In 1964, Bob Dylan wrote and released The Times They Are a-Changin,A" a song that beautifully captured the turbulence of that time. In 2011, we are again facing turbulent times but not one of protests and sit-ins. Rather, the debate about data privacy...