Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
CompTIA A+ Certification All-in-One For Dummies by Glen E. Clarke 9781119581062
RRP: £36.99£25.24Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book-plus online test bank-will help you... -
Surveillance Valley: The Secret Military History of the Internet by Yasha Levine
RRP: £11.99£7.11** Featured as a Guardian Long Read **'[A] fast-paced, myth busting expose' Max Blumenthal, author of The Management of Savagery'Contentious... forceful... salutary' The New YorkerEVERYTHING WE HAVE BEEN TOLD ABOUT THE DEMOCRATIC NATURE OF THE INTERNET... -
Threat Modeling: Designing for Security by Adam Shostack
RRP: £51.00£45.35The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful... -
Pentesting Azure: The Definitive Guide to Testing and Securing Deployments by Matt Burrough
RRP: £37.99£23.69A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small. Packed with real-world examples from the author's experience as a corporate... -
Official (ISC)2 Guide to the CSSLP CBK by Mano Paul
RRP: £79.99£71.20Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL... -
Cyber Security: The complete guide to cyber threats and protection by David Sutton
RRP: £29.99£23.02Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data... -
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski
RRP: £56.99£34.53Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest... -
Black Hat Python by Justin Seitz 9781593275907
RRP: £31.99£20.77When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat... -
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition by Steven Levy
RRP: £23.99£18.37Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly... -
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan 9780674987555
RRP: £23.95£19.14An Open Letters Review Best Book of the Year"One of the finest books on information security published so far in this century-easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive."-Thomas Rid, author of Active Measures"The... -
Big Data Analytics in Cybersecurity by Onur Savas
RRP: £44.99£39.28Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of... -
Linksys WRT54G Ultimate Hacking by Paul Asadoorian 9781597491662
RRP: £28.99£26.37This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components,... -
Hacks, Leaks, And Revelations: The Art of Analyzing Hacked and Leaked Data by Micah Lee 9781718503120
RRP: £47.99£29.27In the age of hacking and whistleblowing, the internet contains massive troves of leaked information containing goldmines of newsworthy revelations in the public interest - if you know how to unravel them. For investigative journalists or amateur... -
Blockchain Basics: A Non-Technical Introduction in 25 Steps by Daniel Drescher 9781484226032
RRP: £27.99£21.21In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required... -
Hacking Kubernetes: Threat-Driven Analysis and Defense by Andrew Martin
RRP: £52.99£34.21Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing... -
SQL Injection Attacks and Defense by Justin Clarke-Salt 9781597499637
RRP: £43.99£39.87SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao... -
Data Ethics: Practical Strategies for Implementing Ethical Information Management and Governance by Katherine O'Keefe
RRP: £44.99£37.60Data-gathering technology is more sophisticated than ever, as are the ethical standards for using this data. This second edition shows how to navigate this complex environment. Data Ethics provides a practical framework for the implementation of... -
The Official (ISC)2 CCSP CBK Reference, 4th Editio n by Kraus
RRP: £65.00£42.05The only official body of knowledge for CCSP-the most popular cloud security credential-fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure... -
Privacy Is Hard and Seven Other Myths: Achieving Privacy Through Careful Design by Jaap-Henk Hoepman
RRP: £27.00£17.59Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262045827Author Jaap-Henk HoepmanFormat HardbackPage Count 256Imprint MIT PressPublisher MIT Press Ltd -
Game Hacking by Nick Cano
RRP: £42.99£30.12You don t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of... -
The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds
RRP: £22.99£15.57Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie... -
Mastering Ethereum by Andreas Antonopoulos 9781491971949
RRP: £52.99£34.61Ethereum represents the gateway to a worldwide, decentralized computing paradigm. This platform enables you to run decentralized applications (DApps) and smart contracts that have no central points of failure or control, integrate with a payment network,... -
Practical Packet Analysis, 3e by Chris Sanders
RRP: £47.99£28.23It s easy to capture packets with Wireshark, the world s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what s happening on your network? Updated to cover Wireshark 2.x, the third... -
If It's Smart, It's Vulnerable by M Hypponen
RRP: £21.99£14.56Reimagine the future of the internet All our devices and gadgets-from our refrigerators to our home security systems, vacuum cleaners, and stereos-are going online, just like our computers did. But once we've successfully connected our devices to the... -
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
RRP: £16.99£12.18Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780307588692Author Kevin PoulsenFormat PaperbackPage Count 288Imprint Random House IncPublisher Random House USA IncWeight(grams) 236gDimensions(mm) 203mm *... -
Cybercrime Investigations: A Comprehensive Resource for Everyone by John Bandler 9781032399980
RRP: £44.99£39.28Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone... -
Cyber War Will Not Take Place by Thomas Rid
RRP: £15.99£14.15'Cyber war is coming,' announced a landmark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the 'fifth domain' of warfare. This book takes stock, twenty years on: is cyber war really coming? Has... -
The Car Hacker's Handbook by Craig Smith
RRP: £47.99£27.67Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven t kept pace with today s more hostile security... -
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan
RRP: £17.95£14.28"A must-read...It reveals important truths."-Vint Cerf, Internet pioneer"One of the finest books on information security published so far in this century-easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive."-Thomas Rid,... -
SSH, the Secure Shell: The Definitive Guide by Daniel Barrett 9780596008956
RRP: £35.99£24.03Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial... -
Cyber Threat Intelligence by Lee
RRP: £82.95£72.52CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack... -
Building Secure and Reliable Systems: SRE and Security Best Practices by Ana Oprea 9781492083122
RRP: £63.99£42.03Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product... -
The 7 Dimensions of Security Culture by Perry Carpenter
RRP: £18.99£12.75Mitigate human risk and bake security into your organization's culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it... -
The DevSecOps Playbook: Deliver Continuous Security at Speed by Sean D. Mack 9781394169795
RRP: £24.99£16.38A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic... -
Measuring and Managing Information Risk: A FAIR Approach by Jack Freund 9780124202313
RRP: £39.99£35.83Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing... -
The Red Web: The Kremlin's Wars on the Internet by Andrei Soldatov
RRP: £14.99£9.80The Internet in Russia is either the most efficient totalitarian tool or the device by which totalitarianism will be overthrown. Perhaps both.On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in... -
Advanced Penetration Testing: Hacking the World's Most Secure Networks by Wil Allsopp 9781119367680
RRP: £39.00£25.25Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring... -
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests by Mike Chapple
RRP: £32.00£20.61Smarter, faster prep for the SSCP exam The (ISC)(2) SSCP Official Practice Tests, 2nd Edition is the only (ISC)(2)-endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapters cover each of... -
Radical Reporting: Writing Better Audit, Risk, Compliance, and Information Security Reports by Sara I. James
RRP: £24.99£21.81Most people dread writing reports; they also dread reading reports. What they don't realize is that the techniques that make writing more readable make it more powerful. This is especially relevant for professionals in areas such as audit, risk,... -
Hackers & Painters: Big Ideas from the Computer Age by Paul Graham
RRP: £19.99£13.35"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham We are living in the...