Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance by Branden R. Williams 9780128015797
RRP: $115.48Booksplease Price: $106.72Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI... -
CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers Todd Fitzgerald (CISO SPOTLIGHT, LLC) 9781498740449
RRP: $283.50Booksplease Price: $249.84#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022!2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success,... -
Big Breaches: Cybersecurity Lessons for Everyone by Neil Daswani
RRP: $58.78Booksplease Price: $48.32The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone-not just... -
Practical OPNsense by Markus Stubbig 9783738632019
RRP: $55.65Booksplease Price: $52.77Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9783738632019Author Markus StubbigFormat PaperbackPage Count 360Imprint Books on DemandPublisher Books on DemandWeight(grams) 644gDimensions(mm) 246mm *... -
Cybersecurity Law, Standards and Regulations: 2nd Edition by Tari Schreider 9781944480561
RRP: $188.98Booksplease Price: $153.09Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781944480561Author Tari SchreiderFormat PaperbackPage Count 326Imprint Rothstein PublishingPublisher Rothstein PublishingWeight(grams) 757g -
The Peter Rabbit Passwordbook / Password Logbook by Beatrix Potter 9783752866575
RRP: $14.49Booksplease Price: $14.28Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9783752866575Author Beatrix PotterFormat PaperbackPage Count 62Imprint Books on DemandPublisher Books on DemandWeight(grams) 73gDimensions(mm) 203mm * 127mm... -
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners by Jason Andress 9780124166721
RRP: $62.98Booksplease Price: $59.89Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of... -
XSS Attacks: Cross Site Scripting Exploits and Defense by Anton Rager 9781597491549
Booksplease Price: $128.04A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It... -
Cyberdanger: Understanding and Guarding Against Cybercrime by Eddy Willems 9783030045302
Booksplease Price: $45.53This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that... -
Writing Security Tools and Exploits by James Foster
Booksplease Price: $79.82Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated... -
IT Security Risk Control Management: An Audit Preparation Plan by Raymond Pompon
RRP: $115.48Booksplease Price: $90.74Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.Information security is more than configuring... -
The Design of Rijndael: AES - The Advanced Encryption Standard by Joan Daemen 9783540425809
Booksplease Price: $169.51Rijndael was the surprise winner of the contest for the new Advanced En cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be ginning in January 1997; Rijndael... -
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value by Michelle Dennedy 9781430263555
Booksplease Price: $84.50"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy... -
The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography by Arno Mittelbach 9783030632892
Booksplease Price: $118.99Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption... -
Cyber-Physical Attacks: A Growing Invisible Threat by George Loukas 9780128012901
RRP: $77.68Booksplease Price: $72.85Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it... -
The Governance of Privacy: Privacy as Process: The Need for Resilient Governance by PROF. DR. MR. Hans de Bruijn
RRP: $44.08Booksplease Price: $42.29We can hardly underestimate the importance of privacy in our data-driven world. Privacy breaches are not just about disclosing information. Personal data is used to profile and manipulate us - sometimes on such a large scale that it affects society as a... -
Complete Guide to CISM Certification Thomas R. Peltier 9780849353567
RRP: $220.50Booksplease Price: $194.61The Certified Information Security Manager (R)(CISM (R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA (R)). It has been designed specifically for experienced information security managers and those... -
Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources by Morey J. Haber
RRP: $115.48Booksplease Price: $83.81Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus-it is not a matter of if, but rather when an organization will be breached. Threat... -
Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp
RRP: $79.80Booksplease Price: $76.55For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum... -
A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities by Sagar Rahalkar 9781484264010
RRP: $83.98Booksplease Price: $59.14Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet... -
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin by Paul C. van Oorschot 9783030834104
RRP: $115.48Booksplease Price: $112.69This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a... -
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities by Benjamin Strout 9781803238876
Booksplease Price: $66.95Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your workKey FeaturesBuild successful strategies for planning and executing zero-day... -
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Tyson Macaulay 9781439801963
RRP: $184.78Booksplease Price: $161.89As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of... -
Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition by Shiva V. N Parasram 9781789341768
Booksplease Price: $86.48Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategiesTest your corporate network against threatsExplore new... -
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing by Rithik Chatterjee 9781484264331
RRP: $83.98Booksplease Price: $56.83Use Red Hat's security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and... -
Risk Management for Computer Security: Protecting Your Network and Information Assets by Andy Jones 9780750677950
Booksplease Price: $99.52Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk... -
Foundations of Security: What Every Programmer Needs to Know by Christoph Kern 9781590597842
RRP: $136.48Booksplease Price: $100.72Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems... -
Reliability and Availability of Cloud Computing by Eric Bauer 9781118177013
RRP: $163.70Booksplease Price: $141.04A holistic approach to service reliability and availability of cloud computing Reliability and Availability of Cloud Computing provides IS/IT system and solution architects, developers, and engineers with the knowledge needed to assess the impact of... -
Mastering Kali Linux for Advanced Penetration Testing - by Vijay Kumar Velu 9781787120235
Booksplease Price: $95.13A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book * Employ advanced pentesting techniques with Kali Linux to build highly-secured systems * Get to grips... -
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic by Robert Shimonski 9780124104136
RRP: $54.58Booksplease Price: $52.50The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature... -
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice by Derrick Rountree 9780124059320
RRP: $54.58Booksplease Price: $39.56As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear... -
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications by Deep Mehta
RRP: $104.98Booksplease Price: $74.51Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications... -
Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury 9783031121661
Booksplease Price: $108.57This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal... -
Introduction to Machine Learning with Applications in Information Security by Mark Stamp
Booksplease Price: $122.62Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn't prove... -
Big Data Analytics in Cybersecurity Onur Savas (Intelligent Automation, Inc., Rockville, Maryland, USA) 9781032096360
RRP: $104.98Booksplease Price: $94.98Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of... -
The Complete Guide to Cybersecurity Risks and Controls Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA) 9781032402550
RRP: $100.78Booksplease Price: $90.47The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will... -
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew Hoog 9781597496599
RRP: $107.08Booksplease Price: $99.35iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the... -
The Database Hacker's Handbook: Defending Database Servers David Litchfield 9780764578014
RRP: $67.18Booksplease Price: $50.80Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database... -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber
RRP: $136.48Booksplease Price: $80.41See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your... -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications by Sanjib Sinha 9781484253908
RRP: $104.98Booksplease Price: $68.15Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move...