null

Recently Viewed

General

Filter By

Sort By:

Display Type:
Filters
  • Book
  • Qty in Cart
  • Quantity
  • Price
  • Subtotal
  • Super Cybersecurity Grandma: Ransomware Episode by Lmb Pailen Cissp 9780692796931

    Super Cybersecurity Grandma: Ransomware Episode by Lmb Pailen Cissp 9780692796931

    RRP: £9.99
    £8.43
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780692796931Author Lmb Pailen CisspFormat PaperbackPage Count 32Imprint Jastin EnterprisesPublisher Jastin EnterprisesWeight(grams) 100g
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £9.99
    £8.43
    Subtotal:
  • Blockchain-based Cyber Security: Applications and Paradigms by Kaushal Shah 9781032485430

    Blockchain-based Cyber Security: Applications and Paradigms by Kaushal Shah 9781032485430

    RRP: £48.99
    £42.66
    The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and the solutions based on Software Defined Networks are discussed. The book presents solutions to deal with cyber security...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £48.99
    £42.66
    Subtotal:
  • A Hacker, I Am by Craig Ford 9780648693918

    A Hacker, I Am by Craig Ford 9780648693918

    RRP: £21.99
    £13.92
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780648693918Author Craig FordFormat PaperbackPage Count 318Imprint Craig FordPublisher Craig FordWeight(grams) 318gDimensions(mm) 203mm * 127mm * 17mm
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £21.99
    £13.92
    Subtotal:
  • Healthy Passwords: Learn to make strong passwords you can remember by Ken S Klein 9780615456850

    Healthy Passwords: Learn to make strong passwords you can remember by Ken S Klein 9780615456850

    RRP: £8.99
    £8.00
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780615456850Author Ken S KleinFormat PaperbackPage Count 152Imprint Sustainable Alternatives, LLCPublisher Sustainable Alternatives, LLCWeight(grams) 159g
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £8.99
    £8.00
    Subtotal:
  • The Hidden World of Hackers: Expressions (Grade 6) by Elise Wallace 9781425858858

    The Hidden World of Hackers: Expressions (Grade 6) by Elise Wallace 9781425858858

    RRP: £11.99
    £7.77
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781425858858Author Elise WallaceFormat PaperbackPage Count 32Imprint Teacher Created Materials, IncPublisher Teacher Created Materials, Inc
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £11.99
    £7.77
    Subtotal:
  • Cybercrime and Digital Deviance by Roderick S. Graham 9781032249193

    Cybercrime and Digital Deviance by Roderick S. Graham 9781032249193

    RRP: £35.99
    £31.69
    Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £35.99
    £31.69
    Subtotal:
  • Database and Application Security: A Practitioner's Guide by R. Sarma Danturthi 9780138073732

    Database and Application Security: A Practitioner's Guide by R. Sarma Danturthi 9780138073732

    RRP: £37.99
    £28.19
    An all-encompassing guide to securing your database and applications against costly cyberattacks!   In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £37.99
    £28.19
    Subtotal:
  • Cybersecurity Terminology & Abbreviations- Comptia Security Certification: A Quickstudy Laminated Reference Guide by George Antoniou 9781423249832

    Cybersecurity Terminology & Abbreviations- Comptia Security Certification: A Quickstudy Laminated Reference Guide by George Antoniou 9781423249832

    RRP: £7.95
    £5.24
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781423249832Author George AntoniouPage Count 6Imprint Barcharts, IncPublisher Barcharts, IncWeight(grams) 69g
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £7.95
    £5.24
    Subtotal:
  • Cryptology and Network Security: 22nd International Conference, CANS 2023, Augusta, GA, USA, October 30 – November 1, 2023, Proceedings by Jing Deng 9789819975624

    Cryptology and Network Security: 22nd International Conference, CANS 2023, Augusta, GA, USA, October 30 – November 1, 2023, Proceedings by Jing Deng 9789819975624

    £67.48
    This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected...
    Qty in Cart: 0
    Quantity:
    Price:
    £67.48
    Subtotal:
  • Information Security Practice and Experience: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings by Weizhi Meng 9789819970315

    Information Security Practice and Experience: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings by Weizhi Meng 9789819970315

    £76.87
    This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume...
    Qty in Cart: 0
    Quantity:
    Price:
    £76.87
    Subtotal:
  • Innovations in Digital Watermarking Techniques by Feng-Hsing Wang 9783642260384

    Innovations in Digital Watermarking Techniques by Feng-Hsing Wang 9783642260384

    RRP: £109.99
    £96.16
    Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £109.99
    £96.16
    Subtotal:
  • Critical Infrastructure Protection V: 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers by Jonathan Butts 9783642248634

    Critical Infrastructure Protection V: 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers by Jonathan Butts 9783642248634

    RRP: £54.99
    £49.52
    The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £49.52
    Subtotal:
  • Advances in Cryptology - EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings by Kenneth G. Paterson 9783642204647

    Advances in Cryptology - EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings by Kenneth G. Paterson 9783642204647

    RRP: £54.99
    £51.71
    This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011. The 31 papers, presented together with 2 invited...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £51.71
    Subtotal:
  • Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings by Masayuki Abe 9783642173721

    Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings by Masayuki Abe 9783642173721

    RRP: £54.99
    £51.79
    ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £51.79
    Subtotal:
  • Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings by Josef Pieprzyk 9783642119248

    Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings by Josef Pieprzyk 9783642119248

    RRP: £54.99
    £50.57
    The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £50.57
    Subtotal:
  • Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings by Michel Abdalla 9783642019562

    Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings by Michel Abdalla 9783642019562

    RRP: £54.99
    £51.20
    This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £51.20
    Subtotal:
  • Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats by Sarah Armstrong-Smith 9781398614307

    Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats by Sarah Armstrong-Smith 9781398614307

    RRP: £95.00
    £78.80
    To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £95.00
    £78.80
    Subtotal:
  • Scada Security: What's Broken and How to Fix It by Andrew Ginter 9780995298408

    Scada Security: What's Broken and How to Fix It by Andrew Ginter 9780995298408

    RRP: £25.00
    £22.86
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780995298408Author Andrew GinterFormat PaperbackPage Count 180Imprint Scada Security - What's Broken and How to Fix ItPublisher Scada Security - What's...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £25.00
    £22.86
    Subtotal:
  • Change Management for Risk Professionals by James J. Leflar Jr 9780367711382

    Change Management for Risk Professionals by James J. Leflar Jr 9780367711382

    RRP: £32.99
    £29.16
    Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about change management. Organizations exist within a complex and changing environment. The changes within the organizational context (e.g.,...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £32.99
    £29.16
    Subtotal:
  • Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings by Diego Zamboni 9783540705413

    Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings by Diego Zamboni 9783540705413

    RRP: £54.99
    £49.52
    On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Every year since 2004 DIMVA has brought together leading...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £49.52
    Subtotal:
  • Geometries, Codes and Cryptography by G. Longo 9783211822050

    Geometries, Codes and Cryptography by G. Longo 9783211822050

    RRP: £54.99
    £49.40
    The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £49.40
    Subtotal:
  • Blockchain: Technology and applications for Industry 4.0, Smart Energy, and Smart Cities by Matevz Pustisek 9783110681123

    Blockchain: Technology and applications for Industry 4.0, Smart Energy, and Smart Cities by Matevz Pustisek 9783110681123

    RRP: £52.99
    £31.84
    Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments. The sense of using blockchains is to minimize the probability of errors, successful frauds...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £52.99
    £31.84
    Subtotal:
  • Software Piracy Exposed by Ron Honick 9781932266986

    Software Piracy Exposed by Ron Honick 9781932266986

    £30.39
    This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen...
    Qty in Cart: 0
    Quantity:
    Price:
    £30.39
    Subtotal:
  • 10 Cool Lego Mindstorm Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour by Syngress 9781931836616

    10 Cool Lego Mindstorm Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour by Syngress 9781931836616

    £15.60
    LEGO MINDSTORMS lets you design and program robots that can do just about anything! The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination...
    Qty in Cart: 0
    Quantity:
    Price:
    £15.60
    Subtotal:
  • The Seven Veils of Privacy: How Our Debates About Privacy Conceal its  Nature by Kieron O'Hara 9781526163035

    The Seven Veils of Privacy: How Our Debates About Privacy Conceal its Nature by Kieron O'Hara 9781526163035

    £22.03
    With the rise of big data and surveillance capitalism, our privacy is increasingly under threat. But discussions of how to protect privacy are often derailed by disagreements over what exactly it is.In this book, Kieron O’Hara sets out to demystify...
    Qty in Cart: 0
    Quantity:
    Price:
    £22.03
    Subtotal:
  • Classical and Modern Cryptography for Beginners by Rajkumar Banoth 9783031329586

    Classical and Modern Cryptography for Beginners by Rajkumar Banoth 9783031329586

    RRP: £69.99
    £62.46
    This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.  It also provides the information on the cryptography and a cryptosystem used by...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £69.99
    £62.46
    Subtotal:
  • Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting by Pim Tuyls 9781849966931

    Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting by Pim Tuyls 9781849966931

    RRP: £109.99
    £97.00
    Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £109.99
    £97.00
    Subtotal:
  • Managing Cybersecurity Risk: Cases Studies and Solutions by Jonathan Reuvid 9781787198913

    Managing Cybersecurity Risk: Cases Studies and Solutions by Jonathan Reuvid 9781787198913

    £29.80
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781787198913Author Jonathan ReuvidFormat PaperbackPage Count 250Imprint Legend BusinessPublisher Legend Press LtdWeight(grams) 500g
    Qty in Cart: 0
    Quantity:
    Price:
    £29.80
    Subtotal:
  • The Target Store Data Breaches: Examination and Insight by Marianna Hardy 9781633212695

    The Target Store Data Breaches: Examination and Insight by Marianna Hardy 9781633212695

    £107.94
    In November and December of 2013, cyber-criminals breached the data security of Target, one of the largest U.S. retail chains, stealing the personal and financial information of millions of customers. On December 19, 2013, Target confirmed that some 40...
    Qty in Cart: 0
    Quantity:
    Price:
    £107.94
    Subtotal:
  • Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission by Julie C. Hartell 9781626183902

    Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission by Julie C. Hartell 9781626183902

    £55.93
    The Federal Trade Commission (FTC) has worked on privacy issues for over forty years, and in 2000 began considering the privacy implications raised by consumers' growing use of mobile devices. More recently, the FTC hosted a mobile privacy panel...
    Qty in Cart: 0
    Quantity:
    Price:
    £55.93
    Subtotal:
  • Unified Communications Forensics: Anatomy of Common UC Attacks by Nicholas Grant 9781597499927

    Unified Communications Forensics: Anatomy of Common UC Attacks by Nicholas Grant 9781597499927

    £31.73
    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book...
    Qty in Cart: 0
    Quantity:
    Price:
    £31.73
    Subtotal:
  • Social Media Security: Leveraging Social Networking While Mitigating Risk by Michael Cross 9781597499866

    Social Media Security: Leveraging Social Networking While Mitigating Risk by Michael Cross 9781597499866

    £36.49
    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's...
    Qty in Cart: 0
    Quantity:
    Price:
    £36.49
    Subtotal:
  • Introduction to Information Security: A Strategic-Based Approach by Timothy Shimeall 9781597499699

    Introduction to Information Security: A Strategic-Based Approach by Timothy Shimeall 9781597499699

    £51.95
    Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is...
    Qty in Cart: 0
    Quantity:
    Price:
    £51.95
    Subtotal:
  • Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization by Eric Cole 9781597499491

    Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization by Eric Cole 9781597499491

    £36.49
    The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue...
    Qty in Cart: 0
    Quantity:
    Price:
    £36.49
    Subtotal:
  • UTM Security with Fortinet: Mastering FortiOS by Kenneth Tam 9781597497473

    UTM Security with Fortinet: Mastering FortiOS by Kenneth Tam 9781597497473

    £27.92
    Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate...
    Qty in Cart: 0
    Quantity:
    Price:
    £27.92
    Subtotal:
  • Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols by Michael T. Raggo 9781597497435

    Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols by Michael T. Raggo 9781597497435

    £36.09
    As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present...
    Qty in Cart: 0
    Quantity:
    Price:
    £36.09
    Subtotal:
  • Wireless Reconnaissance in Penetration Testing by Matthew Neely 9781597497312

    Wireless Reconnaissance in Penetration Testing by Matthew Neely 9781597497312

    £23.57
    In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance...
    Qty in Cart: 0
    Quantity:
    Price:
    £23.57
    Subtotal:
  • Moving To The Cloud: Developing Apps in the New World of Cloud Computing by Sitaram Dinkar 9781597497251

    Moving To The Cloud: Developing Apps in the New World of Cloud Computing by Sitaram Dinkar 9781597497251

    £33.13
    Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors particularly examine cloud platforms that are in use today. They also describe...
    Qty in Cart: 0
    Quantity:
    Price:
    £33.13
    Subtotal:
  • XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts by Steven Bolt 9781597496230

    XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts by Steven Bolt 9781597496230

    £37.43
    XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console - it streams movies, connects with social networking sites and chatrooms, transfer files, and more - it just may...
    Qty in Cart: 0
    Quantity:
    Price:
    £37.43
    Subtotal:
  • Digital Triage Forensics: Processing the Digital Crime Scene by Stephen Pearson 9781597495967

    Digital Triage Forensics: Processing the Digital Crime Scene by Stephen Pearson 9781597495967

    £39.59
    Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the...
    Qty in Cart: 0
    Quantity:
    Price:
    £39.59
    Subtotal:
  • Total: items /

Adding your books to cart