Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Super Cybersecurity Grandma: Ransomware Episode by Lmb Pailen Cissp 9780692796931
RRP: £9.99£8.43Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780692796931Author Lmb Pailen CisspFormat PaperbackPage Count 32Imprint Jastin EnterprisesPublisher Jastin EnterprisesWeight(grams) 100g -
Blockchain-based Cyber Security: Applications and Paradigms by Kaushal Shah 9781032485430
RRP: £48.99£42.66The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and the solutions based on Software Defined Networks are discussed. The book presents solutions to deal with cyber security... -
A Hacker, I Am by Craig Ford 9780648693918
RRP: £21.99£13.92Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780648693918Author Craig FordFormat PaperbackPage Count 318Imprint Craig FordPublisher Craig FordWeight(grams) 318gDimensions(mm) 203mm * 127mm * 17mm -
Healthy Passwords: Learn to make strong passwords you can remember by Ken S Klein 9780615456850
RRP: £8.99£8.00Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780615456850Author Ken S KleinFormat PaperbackPage Count 152Imprint Sustainable Alternatives, LLCPublisher Sustainable Alternatives, LLCWeight(grams) 159g -
The Hidden World of Hackers: Expressions (Grade 6) by Elise Wallace 9781425858858
RRP: £11.99£7.77Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781425858858Author Elise WallaceFormat PaperbackPage Count 32Imprint Teacher Created Materials, IncPublisher Teacher Created Materials, Inc -
Cybercrime and Digital Deviance by Roderick S. Graham 9781032249193
RRP: £35.99£31.69Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as... -
Database and Application Security: A Practitioner's Guide by R. Sarma Danturthi 9780138073732
RRP: £37.99£28.19An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software... -
Cybersecurity Terminology & Abbreviations- Comptia Security Certification: A Quickstudy Laminated Reference Guide by George Antoniou 9781423249832
RRP: £7.95£5.24Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781423249832Author George AntoniouPage Count 6Imprint Barcharts, IncPublisher Barcharts, IncWeight(grams) 69g -
Cryptology and Network Security: 22nd International Conference, CANS 2023, Augusta, GA, USA, October 30 – November 1, 2023, Proceedings by Jing Deng 9789819975624
£67.48This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected... -
Information Security Practice and Experience: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings by Weizhi Meng 9789819970315
£76.87This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume... -
Innovations in Digital Watermarking Techniques by Feng-Hsing Wang 9783642260384
RRP: £109.99£96.16Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking... -
Critical Infrastructure Protection V: 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers by Jonathan Butts 9783642248634
RRP: £54.99£49.52The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous... -
Advances in Cryptology - EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings by Kenneth G. Paterson 9783642204647
RRP: £54.99£51.71This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011. The 31 papers, presented together with 2 invited... -
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings by Masayuki Abe 9783642173721
RRP: £54.99£51.79ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group... -
Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings by Josef Pieprzyk 9783642119248
RRP: £54.99£50.57The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of... -
Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings by Michel Abdalla 9783642019562
RRP: £54.99£51.20This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009. The 32 revised full papers presented were carefully reviewed and... -
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats by Sarah Armstrong-Smith 9781398614307
RRP: £95.00£78.80To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a... -
Scada Security: What's Broken and How to Fix It by Andrew Ginter 9780995298408
RRP: £25.00£22.86Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780995298408Author Andrew GinterFormat PaperbackPage Count 180Imprint Scada Security - What's Broken and How to Fix ItPublisher Scada Security - What's... -
Change Management for Risk Professionals by James J. Leflar Jr 9780367711382
RRP: £32.99£29.16Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about change management. Organizations exist within a complex and changing environment. The changes within the organizational context (e.g.,... -
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings by Diego Zamboni 9783540705413
RRP: £54.99£49.52On behalf of the Program Committee, it is my pleasure to present the p- ceedings of the 5th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Every year since 2004 DIMVA has brought together leading... -
Geometries, Codes and Cryptography by G. Longo 9783211822050
RRP: £54.99£49.40The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information... -
Blockchain: Technology and applications for Industry 4.0, Smart Energy, and Smart Cities by Matevz Pustisek 9783110681123
RRP: £52.99£31.84Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments. The sense of using blockchains is to minimize the probability of errors, successful frauds... -
Software Piracy Exposed by Ron Honick 9781932266986
£30.39This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen... -
10 Cool Lego Mindstorm Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour by Syngress 9781931836616
£15.60LEGO MINDSTORMS lets you design and program robots that can do just about anything! The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination... -
The Seven Veils of Privacy: How Our Debates About Privacy Conceal its Nature by Kieron O'Hara 9781526163035
£22.03With the rise of big data and surveillance capitalism, our privacy is increasingly under threat. But discussions of how to protect privacy are often derailed by disagreements over what exactly it is.In this book, Kieron O’Hara sets out to demystify... -
Classical and Modern Cryptography for Beginners by Rajkumar Banoth 9783031329586
RRP: £69.99£62.46This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by... -
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting by Pim Tuyls 9781849966931
RRP: £109.99£97.00Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive... -
Managing Cybersecurity Risk: Cases Studies and Solutions by Jonathan Reuvid 9781787198913
£29.80Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781787198913Author Jonathan ReuvidFormat PaperbackPage Count 250Imprint Legend BusinessPublisher Legend Press LtdWeight(grams) 500g -
The Target Store Data Breaches: Examination and Insight by Marianna Hardy 9781633212695
£107.94In November and December of 2013, cyber-criminals breached the data security of Target, one of the largest U.S. retail chains, stealing the personal and financial information of millions of customers. On December 19, 2013, Target confirmed that some 40... -
Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission by Julie C. Hartell 9781626183902
£55.93The Federal Trade Commission (FTC) has worked on privacy issues for over forty years, and in 2000 began considering the privacy implications raised by consumers' growing use of mobile devices. More recently, the FTC hosted a mobile privacy panel... -
Unified Communications Forensics: Anatomy of Common UC Attacks by Nicholas Grant 9781597499927
£31.73Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book... -
Social Media Security: Leveraging Social Networking While Mitigating Risk by Michael Cross 9781597499866
£36.49Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's... -
Introduction to Information Security: A Strategic-Based Approach by Timothy Shimeall 9781597499699
£51.95Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is... -
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization by Eric Cole 9781597499491
£36.49The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue... -
UTM Security with Fortinet: Mastering FortiOS by Kenneth Tam 9781597497473
£27.92Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate... -
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols by Michael T. Raggo 9781597497435
£36.09As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present... -
Wireless Reconnaissance in Penetration Testing by Matthew Neely 9781597497312
£23.57In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance... -
Moving To The Cloud: Developing Apps in the New World of Cloud Computing by Sitaram Dinkar 9781597497251
£33.13Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors particularly examine cloud platforms that are in use today. They also describe... -
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts by Steven Bolt 9781597496230
£37.43XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console - it streams movies, connects with social networking sites and chatrooms, transfer files, and more - it just may... -
Digital Triage Forensics: Processing the Digital Crime Scene by Stephen Pearson 9781597495967
£39.59Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the...