null

Recently Viewed

General

Filter By

Sort By:

Display Type:
Filters
  • Book
  • Qty in Cart
  • Quantity
  • Price
  • Subtotal
  • Influences on the Adoption of Multifactor Authentication by Martin C. Libicki 9780833052353

    Influences on the Adoption of Multifactor Authentication by Martin C. Libicki 9780833052353

    £22.72
    Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780833052353Author Martin C. LibickiFormat PaperbackPage Count 62Imprint RANDPublisher RAND
    Qty in Cart: 0
    Quantity:
    Price:
    £22.72
    Subtotal:
  • Anti-Virus Tools and Techniques for Computer by W. Timothy Polk 9780815513643

    Anti-Virus Tools and Techniques for Computer by W. Timothy Polk 9780815513643

    RRP: £19.99
    £18.10
    Anti-Virus Tools & Techniques for ComputerBook InformationISBN 9780815513643Author W. Timothy PolkFormat HardbackPage Count 108Imprint William Andrew PublishingPublisher William Andrew PublishingWeight(grams) 440g
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £19.99
    £18.10
    Subtotal:
  • Security Strategies in Linux Platforms and Applications by Michael Jang 9780763791896

    Security Strategies in Linux Platforms and Applications by Michael Jang 9780763791896

    RRP: £78.99
    £76.72
    PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £78.99
    £76.72
    Subtotal:
  • CCTV for Security Professionals by Alan Matchett 9780750673037

    CCTV for Security Professionals by Alan Matchett 9780750673037

    RRP: £69.99
    £62.70
    CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £69.99
    £62.70
    Subtotal:
  • CCTV Surveillance: Video Practices and Technology by Herman Kruegle 9780750677684

    CCTV Surveillance: Video Practices and Technology by Herman Kruegle 9780750677684

    RRP: £80.99
    £74.33
    This revision of the classic book on CCTV technology, CCTV Surveillance, provides a comprehensive examination of CCTV, covering the applications of various systems, how to design and install a system, and how to choose the right hardware. Taking into...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £80.99
    £74.33
    Subtotal:
  • Home Security: Alarms, Sensors and Systems by Vivian Capel 9780750635462

    Home Security: Alarms, Sensors and Systems by Vivian Capel 9780750635462

    RRP: £47.99
    £43.08
    As crime rates soar every householder looks at ways to protect their home and its contents. This practical guide, in straightforward language, spells out the simple steps you can take to guard your home. It shows how burglars work, and how to thwart them...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £47.99
    £43.08
    Subtotal:
  • Advances in Cryptology - CRYPTO '89: Proceedings by Gilles Brassard 9780387973173

    Advances in Cryptology - CRYPTO '89: Proceedings by Gilles Brassard 9780387973173

    £53.28
    CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series...
    Qty in Cart: 0
    Quantity:
    Price:
    £53.28
    Subtotal:
  • Understanding Intrusion Detection through Visualization by Stefan Axelsson 9780387276342

    Understanding Intrusion Detection through Visualization by Stefan Axelsson 9780387276342

    £94.71
    Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key...
    Qty in Cart: 0
    Quantity:
    Price:
    £94.71
    Subtotal:
  • Image and Video Encryption: From Digital Rights Management to Secured Personal Communication by Andreas Uhl 9780387234021

    Image and Video Encryption: From Digital Rights Management to Secured Personal Communication by Andreas Uhl 9780387234021

    £94.90
    Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume...
    Qty in Cart: 0
    Quantity:
    Price:
    £94.90
    Subtotal:
  • Practical Anonymity: Hiding in Plain Sight Online by Peter Loshin 9780124104044

    Practical Anonymity: Hiding in Plain Sight Online by Peter Loshin 9780124104044

    RRP: £20.99
    £18.96
    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £20.99
    £18.96
    Subtotal:
  • Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems by Cameron H. Malin 9780124095076

    Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems by Cameron H. Malin 9780124095076

    RRP: £13.99
    £12.98
    Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £13.99
    £12.98
    Subtotal:
  • The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice by Steve Winterfeld 9780124047372

    The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice by Steve Winterfeld 9780124047372

    RRP: £23.99
    £16.49
    The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £23.99
    £16.49
    Subtotal:
  • Integrating Python with Leading Computer Forensics Platforms by Chet Hosmer 9780128099490

    Integrating Python with Leading Computer Forensics Platforms by Chet Hosmer 9780128099490

    RRP: £41.50
    £37.43
    Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £41.50
    £37.43
    Subtotal:
  • Federal Cloud Computing: The Definitive Guide for Cloud Service Providers by Matthew Metheny 9780128097106

    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers by Matthew Metheny 9780128097106

    RRP: £54.99
    £50.18
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £54.99
    £50.18
    Subtotal:
  • Theoretical and Experimental Methods for Defending Against DDoS Attacks by Iraj Sadegh Amiri 9780128053911

    Theoretical and Experimental Methods for Defending Against DDoS Attacks by Iraj Sadegh Amiri 9780128053911

    RRP: £47.99
    £43.08
    Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £47.99
    £43.08
    Subtotal:
  • Contemporary Digital Forensic Investigations of Cloud and Mobile Applications by Kim-Kwang Raymond Choo 9780128053034

    Contemporary Digital Forensic Investigations of Cloud and Mobile Applications by Kim-Kwang Raymond Choo 9780128053034

    RRP: £73.99
    £66.97
    Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £73.99
    £66.97
    Subtotal:
  • Cyber Guerilla by Jelle Van Haaster 9780128051979

    Cyber Guerilla by Jelle Van Haaster 9780128051979

    RRP: £34.99
    £31.73
    Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. ...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £34.99
    £31.73
    Subtotal:
  • Data Breach Preparation and Response: Breaches are Certain, Impact is Not by Kevvie Fowler 9780128034514

    Data Breach Preparation and Response: Breaches are Certain, Impact is Not by Kevvie Fowler 9780128034514

    RRP: £50.99
    £45.70
    Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £50.99
    £45.70
    Subtotal:
  • Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis by Brett Shavers 9780128033401

    Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis by Brett Shavers 9780128033401

    RRP: £43.99
    £39.59
    Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £43.99
    £39.59
    Subtotal:
  • Building an Intelligence-Led Security Program by Allan Liska 9780128021453

    Building an Intelligence-Led Security Program by Allan Liska 9780128021453

    RRP: £47.99
    £43.08
    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £47.99
    £43.08
    Subtotal:
  • Building a Practical Information Security Program by Jason Andress 9780128020425

    Building a Practical Information Security Program by Jason Andress 9780128020425

    RRP: £50.99
    £45.70
    Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £50.99
    £45.70
    Subtotal:
  • The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues by Ryan Ko 9780128015957

    The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues by Ryan Ko 9780128015957

    RRP: £87.99
    £79.90
    Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security...
    Qty in Cart: 0
    Quantity:
    Price:
    RRP: £87.99
    £79.90
    Subtotal:
  • Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings by Ronald Cramer 9783642289132

    Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings by Ronald Cramer 9783642289132

    £51.57
    This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131...
    Qty in Cart: 0
    Quantity:
    Price:
    £51.57
    Subtotal:
  • Computer Safety, Reliability, and Security: 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedings by Francesco Flammini 9783642242694

    Computer Safety, Reliability, and Security: 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedings by Francesco Flammini 9783642242694

    £49.95
    This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011. The 34 full papers presented together were carefully reviewed and...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.95
    Subtotal:
  • Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers by Tomas Filler 9783642241772

    Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers by Tomas Filler 9783642241772

    £48.77
    This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of...
    Qty in Cart: 0
    Quantity:
    Price:
    £48.77
    Subtotal:
  • Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings by Feng Bao 9783642210303

    Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings by Feng Bao 9783642210303

    £49.80
    This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.80
    Subtotal:
  • Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings by Daniel J. Bernstein 9783642126772

    Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings by Daniel J. Bernstein 9783642126772

    £49.72
    Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.72
    Subtotal:
  • Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings by Juan M. Gonzalez Nieto 9783642027031

    Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings by Juan M. Gonzalez Nieto 9783642027031

    £48.34
    ThisvolumecontainstheproceedingsofATC2009,the6thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Brisbane, A- tralia, during July 7-9, 2009. The...
    Qty in Cart: 0
    Quantity:
    Price:
    £48.34
    Subtotal:
  • Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers by Kaushal Solanki 9783540889601

    Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers by Kaushal Solanki 9783540889601

    £48.85
    th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three...
    Qty in Cart: 0
    Quantity:
    Price:
    £48.85
    Subtotal:
  • Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings by Tzong-Chen Wu 9783540858843

    Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings by Tzong-Chen Wu 9783540858843

    £50.10
    The 11th Information Security Conference (ISC 2008) was held in Taipei, T- wan, September 15-18,2008. ISC is an annual international conference covering researchintheoryandapplicationsofinformationsecurity.Itwas?rstinitiatedas a workshop(ISW) in Japan in...
    Qty in Cart: 0
    Quantity:
    Price:
    £50.10
    Subtotal:
  • Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings by Steven Galbraith 9783540855033

    Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings by Steven Galbraith 9783540855033

    £49.37
    This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.37
    Subtotal:
  • Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers by Gene Tsudik 9783540852292

    Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers by Gene Tsudik 9783540852292

    £48.77
    This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008. The 16 revised full papers and 9 revised short...
    Qty in Cart: 0
    Quantity:
    Price:
    £48.77
    Subtotal:
  • Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada,  August 10-13, 2008, Proceedings by Reihaneh Safavi-Naini 9783540850922

    Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings by Reihaneh Safavi-Naini 9783540850922

    £48.34
    This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions...
    Qty in Cart: 0
    Quantity:
    Price:
    £48.34
    Subtotal:
  • Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers by Dingyi Pei 9783540794981

    Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers by Dingyi Pei 9783540794981

    £50.28
    The Third SKLOIS Conference on Information Security and Cryptology (- scrypt2007)wasorganizedbytheStateKeyLaboratoryofInformationSecurity of the Chinese Academy of Sciences in cooperation with Qinhai University for Nationalities. This international...
    Qty in Cart: 0
    Quantity:
    Price:
    £50.28
    Subtotal:
  • Cryptographic Hardware and Embedded Systems - CHES 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings by Pascal Paillier 9783540747345

    Cryptographic Hardware and Embedded Systems - CHES 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings by Pascal Paillier 9783540747345

    £49.72
    This book constitutes the refereed proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007. The 31 revised full papers cover side channels, low resources, hardware attacks and countermeasures, special...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.72
    Subtotal:
  • Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers by Kaisa Nyberg 9783540710387

    Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers by Kaisa Nyberg 9783540710387

    £50.02
    This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008. The 26 revised full papers presented together with 4 short papers were...
    Qty in Cart: 0
    Quantity:
    Price:
    £50.02
    Subtotal:
  • Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings by Nikita Borisov 9783540706298

    Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings by Nikita Borisov 9783540706298

    £48.19
    The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23-25,2008.This year completed the transition from workshop to symposium, with a printed proceedings published before the symposium. PETS remains a...
    Qty in Cart: 0
    Quantity:
    Price:
    £48.19
    Subtotal:
  • Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings by Yi Mu 9783540699712

    Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings by Yi Mu 9783540699712

    £49.95
    The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7-9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.95
    Subtotal:
  • Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings by Hiroshi Yoshiura 9783540476993

    Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings by Hiroshi Yoshiura 9783540476993

    £49.56
    This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions.Book...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.56
    Subtotal:
  • Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings by Louis Goubin 9783540465591

    Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings by Louis Goubin 9783540465591

    £49.68
    This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006. The 32 revised full papers presented together with three invited talks...
    Qty in Cart: 0
    Quantity:
    Price:
    £49.68
    Subtotal:
  • Total: items /

Adding your books to cart