Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game by Josh More 9780124166011
RRP: £20.99£18.96There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do... -
Simple Steps to Data Encryption: A Practical Guide to Secure Computing by Peter Loshin 9780124114838
RRP: £23.99£21.51Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that... -
Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors by Josh More 9780124096073
RRP: £20.99£18.96Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and... -
Operating System Forensics by Ric Messier 9780128019498
RRP: £54.99£49.58Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows,... -
Cyber Attacks: Protecting National Infrastructure by Edward G. Amoroso 9780123849175
RRP: £43.99£39.99Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for... -
Computer Attack & Cyberterrorism by Clay Wilson 9781606923375
RRP: £52.99£35.32Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack... -
Strategies for Trusted Identities & Infrastructure in Cyberspace by Robert J. Kask 9781614701743
RRP: £134.99£89.12Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. However, with the broad reach of a loose and lightly regulated digital infrastructure, great risks threaten nations, private... -
U.S. National Cybersecurity: Strategic Challenges & Opportunities by Grace Powers 9781633218314
RRP: £163.99£107.94Cyber-attacks could have a potentially devastating impact on the nation's computer systems and networks, disrupting the operations of government and businesses and the lives of private individuals. Increasingly sophisticated cyber threats have... -
Surveillance Systems: Design, Applications & Technology by Roger Simmons 9781536107036
RRP: £115.99£93.52Chapter One reviews basis elementary of residence security, classical residence security and health care surveillance system versus computer vision technique system, as well as directional versus omnidirectional imaging. Chapter Two provides practical... -
Creating a National Framework for Cybersecurity: An Analysis of Issues & Options by Eric A. Fischer 9781604565591
RRP: £39.99£26.95Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state... -
Data Breaches of Personally Identifiable Information at Federal Agencies: Analyses & Lessons by MaryAnne Catalano 9781631178849
RRP: £84.99£55.93The term "data breach" generally refers to the unauthorised or unintentional exposure, disclosure, or loss of sensitive information. A data breach can leave individuals vulnerable to identity theft or other fraudulent activity. Although federal... -
Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference by Steven Furnell 9781441940056
£95.36This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity... -
Federal Cybersecurity: Identification & Mitigation Efforts of Sector-Specific Agencies by Jeffery H. Matthews 9781634853101
RRP: £78.99£64.14U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission facilities, are systems and assets, whether physical or virtual, vital to the nations security, economy, and public health and... -
See Yourself in Cyber: Security Careers Beyond Hacking by Ed Adams 9781394225590
RRP: £21.99£14.56A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful... -
Pen Testing from Contract to Report by Alfred Basta 9781394176786
RRP: £74.95£72.31Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can... -
Security Without Obscurity: A Guide to PKI Operations by Jeff Stapleton 9781032545257
RRP: £44.99£39.28Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and... -
C# For Java Programmers by Harold Cabrera 9781931836548
RRP: £33.99£23.93Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your repertoire and marketability with C# for Java Progammers! C# for Java Programmers will prepare readers for the .NET framework by building on what they already know about... -
Dr. Tom Shinder's Configuring ISA Server 2004 by Debra Littlejohn Shinder 9781931836197
RRP: £37.99£27.79Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web... -
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques by Thomas Wilhelm 9781597495882
RRP: £34.99£23.97Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques,... -
Risk Management Framework: A Lab-Based Approach to Securing Information Systems by James Broad 9781597499958
RRP: £46.99£42.20The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but... -
Coding for Penetration Testers: Building Better Tools by Jason Andress 9781597497299
RRP: £27.99£19.47Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It... -
Migrating to the Cloud: Oracle Client/Server Modernization by Tom Laszewski 9781597496476
RRP: £34.99£23.97Migrating to the Cloud: Oracle Client/Server Modernization is a reference guide for migrating client/server applications to the Oracle cloud. Organized into 14 chapters, the book offers tips on planning, determining effort and budget, designing the... -
Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference by Dustin Hannifin 9781597495783
RRP: £34.99£24.57Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the... -
The Real MCTS SQL Server 2008 Exam 70-433 Prep Kit: Database Design by Mark Horninger 9781597494212
RRP: £43.99£31.16SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005, and it brings increased ability to deliver data across more platforms, and thus many different types of devices... -
The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance by Mark Horninger 9781597494205
RRP: £43.99£31.16SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005, because it brings increased ability to... -
The Real Citrix CCA Exam Preparation Kit: Prepare for XenApp 5.0 by Shawn Tooley 9781597494199
RRP: £41.99£38.84The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a... -
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity by Dale Liu 9781597494182
RRP: £46.99£42.60Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes... -
Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure by Jack Wiles 9781597492829
RRP: £49.99£45.22Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation... -
Netcat Power Tools by Jan Kanclirz 9781597492577
RRP: £43.99£39.99Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often... -
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals by Constantine Photopoulos 9781597492393
RRP: £46.50£41.79Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a... -
The Real MCTS/MCITP Exam 70-648 Prep Kit: Independent and Complete Self-Paced Solutions by Brien Posey 9781597492362
RRP: £43.99£31.76This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the... -
The Real MCTS/MCITP Exam 70-649 Prep Kit: Independent and Complete Self-Paced Solutions by Brien Posey 9781597492348
RRP: £43.99£31.76This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are... -
The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments by Craig S. Wright 9781597492669
RRP: £52.99£48.45The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both... -
CD and DVD Forensics by Paul Crowley 9781597491280
RRP: £35.99£32.60CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public... -
Nokia Firewall, VPN, and IPSO Configuration Guide by Andrew Hay 9781597492867
RRP: £46.50£42.79"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements." --Chris Christiansen, Vice... -
Digital and Document Examination by Max M. Houck 9780128027172
RRP: £78.95£71.94The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward. This volume, Digital and Document Examination, will serve as a graduate level text for those studying and... -
Automated Fingerprint Identification Systems (AFIS) by Peter Komarinski 9780124183513
RRP: £61.99£55.71An easy-to-understand synopsis of identification systems, presenting in simple language the process of fingerprint identification, from the initial capture of a set of finger images, to the production of a Rapsheet. No other single work exists which... -
Information Protection Playbook by Greg Kane 9780124172326
RRP: £55.00£49.22The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one... -
Thor's OS Xodus: Why And How I Left Windows For OS X by Timothy Mullen 9780124104631
RRP: £41.50£37.43Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to... -
Intelligent Systems for Security Informatics by Christopher C. Yang 9780124047020
RRP: £87.00£78.44The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most...