Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Implementing Identity Management on AWS: A real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments by Jon Lehtinen 9781800562288
Booksplease Price: $85.81Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application levelKey FeaturesLearn administrative lifecycle management and... -
Principles of Information Security by Michael Whitman 9781337102063
Booksplease Price: $175.83Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all... -
Cyber Security and IT Infrastructure Protection by John R. Vacca
RRP: $77.68Booksplease Price: $73.48This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent... -
Practical Cryptography in Python: Learning Correct Cryptography by Example by Seth James Nielson 9781484248997
RRP: $104.98Booksplease Price: $72.77Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. ... -
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks Susan Young 9780849308888
RRP: $283.50Booksplease Price: $251.52The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is... -
FISMA Compliance Handbook: Second Edition by Laura Taylor 9780124058712
RRP: $115.48Booksplease Price: $106.72This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law... -
CCTV: From Light to Pixels by Vlado Damjanovski 9780124045576
RRP: $149.08Booksplease Price: $136.31The new edition of CCTV, a high-level professional reference, is expanded to cover all video compression techniques used in the ever-increasing assortment of digital video recorders (DVRs) available on the market today. In addition to demystifying DVR... -
Hardware Security: A Hands-on Learning Approach by Swarup Bhunia 9780128124772
RRP: $157.48Booksplease Price: $151.60Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques... -
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects by Brett Shavers 9781597499859
RRP: $92.38Booksplease Price: $86.42Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work... -
Data Analytics for Internal Auditors Richard E. Cascarino 9781498737142
RRP: $151.18Booksplease Price: $133.96There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The... -
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity by Rishalin Pillay 9781804612590
Booksplease Price: $95.13Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale Key Features Use the ethical hacking methodology and thought process to perform a successful ethical... -
Practical Deployment of Cisco Identity Services Engine (ISE): Real-World Examples of AAA Deployments by Andy Richter 9780128044575
RRP: $115.48Booksplease Price: $106.72With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management... -
Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers by Sreejith Keeriyattil 9781484254301
RRP: $104.98Booksplease Price: $68.15Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center... -
Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox Jim Seaman 9781032263892
RRP: $107.08Booksplease Price: $95.82The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful... -
Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts by Howard E. Poston, III
RRP: $48.28Booksplease Price: $36.25The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and... -
The Darkening Web by Alexander Klimburg
RRP: $35.68Booksplease Price: $26.21Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780735222830Author Alexander KlimburgFormat PaperbackPage Count 448Imprint Prentice Hall PressPublisher Prentice Hall Press -
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software by Michael Schwartz
RRP: $115.48Booksplease Price: $90.66Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build... -
Learning Android Forensics: Analyze Android devices with the latest forensic tools and techniques, 2nd Edition by Oleg Skulkin 9781789131017
Booksplease Price: $84.80A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniquesAnalyze the most popular Android applications using free and open... -
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Branden R. Williams 9780128015797
RRP: $115.48Booksplease Price: $106.72Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI... -
CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers Todd Fitzgerald (CISO SPOTLIGHT, LLC) 9781498740449
RRP: $283.50Booksplease Price: $249.84#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022!2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success,... -
Big Breaches: Cybersecurity Lessons for Everyone by Neil Daswani
RRP: $58.78Booksplease Price: $48.32The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone-not just... -
Practical OPNsense by Markus Stubbig 9783738632019
RRP: $55.65Booksplease Price: $52.77Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9783738632019Author Markus StubbigFormat PaperbackPage Count 360Imprint Books on DemandPublisher Books on DemandWeight(grams) 644gDimensions(mm) 246mm *... -
Cybersecurity Law, Standards and Regulations: 2nd Edition by Tari Schreider 9781944480561
RRP: $188.98Booksplease Price: $156.20Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781944480561Author Tari SchreiderFormat PaperbackPage Count 326Imprint Rothstein PublishingPublisher Rothstein PublishingWeight(grams) 757g -
The Peter Rabbit Passwordbook / Password Logbook by Beatrix Potter 9783752866575
RRP: $14.49Booksplease Price: $14.28Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9783752866575Author Beatrix PotterFormat PaperbackPage Count 62Imprint Books on DemandPublisher Books on DemandWeight(grams) 73gDimensions(mm) 203mm * 127mm... -
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress 9780124166721
RRP: $62.98Booksplease Price: $59.89Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of... -
XSS Attacks: Cross Site Scripting Exploits and Defense by Anton Rager 9781597491549
Booksplease Price: $128.04A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It... -
Cyberdanger: Understanding and Guarding Against Cybercrime by Eddy Willems 9783030045302
Booksplease Price: $45.53This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that... -
Writing Security Tools and Exploits by James Foster
Booksplease Price: $79.82Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated... -
IT Security Risk Control Management: An Audit Preparation Plan by Raymond Pompon
RRP: $115.48Booksplease Price: $90.74Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.Information security is more than configuring... -
The Design of Rijndael: AES - The Advanced Encryption Standard by Joan Daemen 9783540425809
Booksplease Price: $169.51Rijndael was the surprise winner of the contest for the new Advanced En cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be ginning in January 1997; Rijndael... -
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value by Michelle Dennedy 9781430263555
Booksplease Price: $84.50"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy... -
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography by Arno Mittelbach 9783030632892
Booksplease Price: $118.99Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption... -
Cyber-Physical Attacks: A Growing Invisible Threat by George Loukas 9780128012901
RRP: $77.68Booksplease Price: $72.85Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it... -
The Governance of Privacy: Privacy as Process: The Need for Resilient Governance by PROF. DR. MR. Hans de Bruijn
RRP: $44.08Booksplease Price: $42.29We can hardly underestimate the importance of privacy in our data-driven world. Privacy breaches are not just about disclosing information. Personal data is used to profile and manipulate us - sometimes on such a large scale that it affects society as a... -
Complete Guide to CISM Certification Thomas R. Peltier 9780849353567
RRP: $220.50Booksplease Price: $194.61The Certified Information Security Manager (R)(CISM (R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA (R)). It has been designed specifically for experienced information security managers and those... -
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources by Morey J. Haber
RRP: $115.48Booksplease Price: $83.81Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus-it is not a matter of if, but rather when an organization will be breached. Threat... -
Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp
RRP: $79.80Booksplease Price: $76.55For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum... -
A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities by Sagar Rahalkar 9781484264010
RRP: $83.98Booksplease Price: $59.14Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet... -
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin by Paul C. van Oorschot 9783030834104
RRP: $115.48Booksplease Price: $112.69This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a... -
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities by Benjamin Strout 9781803238876
Booksplease Price: $66.95Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your workKey FeaturesBuild successful strategies for planning and executing zero-day...