Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
The Hacker Playbook 3: Practical Guide to Penetration Testing by Peter Kim 9781980901754
RRP: £29.95£24.88Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781980901754Author Peter KimFormat PaperbackPage Count 290Imprint Independently PublishedPublisher Independently PublishedWeight(grams) 508gDimensions(mm)... -
Understanding Cryptography: A Textbook for Students and Practitioners by Bart Preneel
RRP: £32.99£30.44Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded... -
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global by Geoff White
RRP: £12.99£9.09On 4 May 2000, an email that read 'kindly check the attached LOVELETTER' was sent from Philippines. Attached was a virus, the Love Bug, and within days it had paralysed banks, broadcasters and businesses across the globe. The age of Crime Dot Com had... -
31 Days Before Your CCNP and CCIE Enterprise Core Exam by Patrick Gargano
RRP: £29.99£22.33Now updated for the 350-401 ENCOR v1.1 exam release! Digital chapter updates are available for download on the companion website after product registration. The new reprint from Cisco Press will include the latest content. 31 Days Before Your CCNP and... -
PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell by Lee Holmes
RRP: £71.99£47.59How do you use PowerShell to navigate the filesystem, manage files and folders, or retrieve a web page? This introduction to the PowerShell language and scripting environment provides more than 400 task-oriented recipes to help you solve all kinds of... -
The Tangled Web by Michal Zalewski 9781593273880
RRP: £56.99£37.33Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle... -
The Ghidra Book: A Definitive Guide by Chris Eagle
RRP: £56.99£37.93The Ghidra Book teaches readers how to use Ghidra to answer the hardest problems about software behavior. It is a tutorial about Ghidra's features that includes examples and instructions on how to use and modify the open source software to make it meet... -
Agile Application Security by Rich Smith 9781491938843
RRP: £47.99£31.51Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their... -
The Perfect Weapon: war, sabotage, and fear in the cyber age by David Sanger 9781911617723
RRP: £14.99£10.20From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists. Cheap to acquire, easily deniable, and used for a variety of... -
Security Chaos Engineering: Developing Resilience and Safety at Speed and Scale by Kelly Shortridge
RRP: £52.99£34.21Information security is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel mounting pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are... -
Container Security: Fundamental Technology Concepts that Protect Containerized Applications by Liz Rice
RRP: £44.99£29.25To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies... -
Project Zero Trust: A Story about a Strategy for A ligning Security and the Business by Finney
RRP: £21.99£14.56Implement Zero Trust initiatives efficiently and effectively In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and... -
The Language of Deception: Weaponizing Next Generation AI by Justin Hutchens 9781394222544
RRP: £26.99£17.59A penetrating look at the dark side of emerging AI technologies In The Language of Deception: Weaponizing Next Generation AI, artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary... -
Blue Team Field Manual (BTFM) by Ben Clark
RRP: £14.99£12.56Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781541016361Author Ben ClarkFormat PaperbackPage Count 134Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent Publishing... -
Confident Cyber Security: The Essential Insights and How to Protect from Threats by Dr Jessica Barker 9781398611924
RRP: £14.99£9.80The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident... -
CompTIA PenTest+ Practice Tests: Exam PT0-001 by Crystal Panek 9781119542841
RRP: £30.99£20.41The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills... -
Security and Microservice Architecture on AWS by Guarav Raje
RRP: £52.99£34.21Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their response is more reactive than proactive. That leads to unnecessarily complicated... -
Crafting an Information Security Playbook by Jeff Bollinger 9781491949405
RRP: £39.99£26.15Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat... -
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick 9780764542800
RRP: £10.00£6.80The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of... -
Crypto Wars: Faked Deaths, Missing Billions and Industry Disruption by Erica Stanford 9781398600683
RRP: £16.99£11.86HIGHLY COMMENDED: Business Book Awards 2022 - Specialist Business Book Crypto is big news. You may be an existing user yourself or have friends that laud its promise of getting rich fast. Arm yourself with the knowledge to come out on top in the... -
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Third Edition by Chapple
RRP: £34.99£22.83The only official CCSP practice test product endorsed by (ISC)2 With over 850 practice questions all new for the 2022-2025 exam objectives, (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 3rd Edition gives you the opportunity... -
Information Risk Management: A practitioner's guide by David Sutton
RRP: £44.99£34.82Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic... -
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle, 3rd Edition by Chapple
RRP: £75.00£48.25This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide, 3rd Edition with an updated collection of practice questions and practice exams in... -
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott Shapiro
RRP: £25.00£17.62Hacking, espionage, war and cybercrime as you've never read about them beforeFancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National... -
Poc or Gtfo, Volume 3 by Manul Laphroaig
RRP: £37.99£22.54The international journal of Proof-of-Concept or Get the Fuck Out is a celebrated collection of short essays on computer security, reverse engineering and retro-computing topics by many of the world's most famous hackers. Topics include how to dump the... -
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide by Mike Wills
RRP: £47.50£31.81The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical... -
Deep Dive: Exploring the Real-world Value of Open Source Intelligence by Micah Hoffman 9781119933243
RRP: £34.99£22.83Learn to gather and analyze publicly available data for your intelligence needs In Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae Baker explains how to use publicly available data to... -
Intercept: The Secret History of Computers and Spies by Gordon Corera
RRP: £12.99£8.60The computer was born to spy, and now computers are transforming espionage. But who are the spies and who is being spied on in today's interconnected world? This is the exhilarating secret history of the melding of technology and espionage. Gordon... -
Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam 9781597499897
RRP: £39.99£27.39Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's... -
What Is Cybersecurity For? by Tim Stevens
RRP: £8.99£7.27How will protecting our digital infrastructure shape our future? Cybersecurity is one of the key practical and political challenges of our time. It is at the heart of how modern societies survive and thrive, yet public understanding is still... -
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures by Phillip Windley
RRP: £44.99£29.25Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides... -
Insider Risk and Personnel Security: An introduction by Paul Martin 9781032358543
RRP: £35.99£31.69This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.Some of the most problematic risks confronting businesses and... -
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware by Aditya Sood 9780128006047
RRP: £23.99£21.07Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service... -
The Psychology of Insider Risk: Detection, Investigation and Case Management by Eric Shaw 9781032482484
RRP: £44.99£39.28Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. After a career... -
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws by Dafydd Stuttard
RRP: £46.00£30.87The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise... -
The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management by Arthur B. Cooper Jr. 9781484292877
RRP: £54.99£32.35This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor-known as a Qualified Security... -
Math For Security: From Graphs and Geometry to Spatial Analysis by Daniel Reilly 9781718502567
RRP: £47.99£27.28Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to use concepts from various fields of mathematics - like graph theory, computational geometry, and... -
Information Security Policies, Procedures, and Standards: A Practitioner's Reference by Douglas J. Landoll
RRP: £125.00£107.86Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and... -
Cybersecurity Essentials by Charles J. Brooks
RRP: £33.00£22.22An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective... -
Gray Hat C: A Hacker's Guide to Creating and Automating Security Tools by Brandon Perry
RRP: £47.99£31.71Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run...