Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Securing and Controlling Cisco Routers by Peter T. Davis
RRP: £110.00£96.11Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing... -
Crime Prevention: Theory and Practice, Second Edition by Stephen Schneider
RRP: £35.99£31.69In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest research, the most recently published articles and books, and feedback from professors and students using the first... -
Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition by David R. Matthews
RRP: £68.99£59.92Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data-if that is indeed possible. This book is for all of... -
American Volunteer Police: Mobilizing for Security by Martin Alan Greenberg
RRP: £135.00£117.68Today, it is estimated there are over 200,000 volunteers in police work throughout the United States. Although the need for such volunteers has never been greater, there is a lack of published materials regarding the nature of volunteer police work and... -
Managing Intelligence: A Guide for Law Enforcement Professionals by John Buckley
RRP: £84.99£74.25Intelligence is used daily by law enforcement personnel across the world in operations to combat terrorism and drugs and to assist in investigating serious and organized crime. Managing Intelligence: A Guide for Law Enforcement Professionals is designed... -
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent it by Jonathan Zdziarski
RRP: £31.99£21.01Based on unique and previously undocumented research, this book by noted iOS expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the... -
Quantitative Security Risk Assessment of Enterprise Networks by Xinming Ou
£47.05Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for... -
Policing Organized Crime: Intelligence Strategy Implementation by Petter Gottschalk
RRP: £135.00£117.28When criminal activity is as straightforward as a child's game of cops and robbers, the role of the police is obvious, but today's bad guys don't always wear black. In fact, the most difficult criminals to cope with are those who straddle the gray divide... -
Security Requirements Engineering: Designing Secure Socio-Technical Systems by Fabiano Dalpiaz
RRP: £52.00£44.20Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262034210Author Fabiano DalpiazFormat HardbackPage Count 224Imprint MIT PressPublisher MIT Press LtdDimensions(mm) 229mm * 178mm * 11mm -
Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science by Wayne Patterson
RRP: £86.99£75.54Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation.Yet, Cybersecurity has had far too little study and research. Virtually... -
Case Studies in Secure Computing: Achievements and Trends by Biju Issac
RRP: £52.99£46.43In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through... -
IT Security Governance Guidebook with Security Program Metrics on CD-ROM by Fred Cohen
RRP: £120.00£103.61The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs... -
Practical Hacking Techniques and Countermeasures by Mark D. Spivey
RRP: £94.99£83.95Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen... -
Software Deployment, Updating, and Patching by Bill Stackpole
RRP: £130.00£112.51The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not... -
Investigator's Guide to Steganography by Gregory Kipper
RRP: £94.99£82.35Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there... -
Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) by CISSP Susan Hansche
RRP: £84.99£75.45The Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book... -
The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques by Thomas R. Peltier
RRP: £94.99£82.35Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test... -
Building an Information Security Awareness Program by Mark B. Desman
RRP: £94.99£82.35In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and... -
Police Corruption: Preventing Misconduct and Maintaining Integrity by Tim Prenzler
RRP: £45.99£40.13While many police officers undertake their work conforming to the highest ethical standards, the fact remains that unethical police conduct continues to be a recurring problem around the world. With examples from a range of jurisdictions, Police... -
Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition by Elsa Lee
RRP: £54.99£47.72Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protecting people and assets. The threats have evolved, however, becoming more insidious. They no longer comprise just terrorists who target critical... -
Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five by Bruce F. Baker
RRP: £32.99£29.16Trends in Policing: Interviews with Police Leaders Across the Globe, Volume Five, is based on the premise that police officials have a wealth of experience that can make significant contributions to our understanding of the prospects and problems of... -
Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications by Yassine Maleh
RRP: £66.99£57.83Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in... -
System Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber World by Igor Ljubuncic
RRP: £54.99£17.32Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more... -
Effective Child Abuse Investigation for the Multi-Disciplinary Team by Bradley Richard Graham
RRP: £58.99£51.08Child abuse cases are unique in that they involve seldomly witnessed acts. A nonverbal victim and a silent perpetrator will often lead to a stalling of the investigation and the judicial process. Effective Child Abuse Investigation for the... -
Transnational Security by Marie-Helen Maras
RRP: £105.00£91.26Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and... -
A History of Cyber Security Attacks: 1980 to Present by Bruce Middleton
RRP: £42.99£37.59Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For... -
Private and Controversial: When Privacy and Public Health Meet in India by Smriti Parsheera
£22.09Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9789356295049Author Smriti ParsheeraFormat PaperbackPage Count 428Imprint HarperCollins IndiaPublisher HarperCollins IndiaWeight(grams) 370gDimensions(mm)... -
From Police to Security Professional: A Guide to a Successful Career Transition by Michael S. D'Angelo
RRP: £49.99£43.50Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in... -
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? by Ulf Mattsson
RRP: £38.99£34.62"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays... -
Creating an Information Security Program from Scratch by Walter Williams
RRP: £48.99£42.66This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated... -
Configuring Juniper Networks NetScreen and SSG Firewalls by Rob Cameron
RRP: £36.99£25.85Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security... -
Community Policing in Indigenous Communities by Mahesh K. Nalla
RRP: £58.99£51.08Indigenous communities are typically those that challenge the laws of the nation states of which they have become-often very reluctantly-a part. Around the world, community policing has emerged in many of these regions as a product of their physical... -
Case Studies in Intelligent Computing: Achievements and Trends by Biju Issac
RRP: £52.99£47.03Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing:... -
Cybersecurity: Geopolitics, Law, and Policy by Amos N. Guiora
RRP: £43.99£38.44This book examines the legal and policy aspects of cyber-security.It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations... -
Walling Out the Insiders: Controlling Access to Improve Organizational Security by Michael Erbschloe
RRP: £69.99£60.36Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to... -
Information Security: Design, Implementation, Measurement, and Compliance by Timothy P. Layton
RRP: £120.00£103.61Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad... -
Audit and Trace Log Management: Consolidation and Analysis by Phillip Q. Maier
RRP: £100.00£86.61As regulation and legislation evolve, the critical need for cost-effective and efficient IT audit and monitoring solutions will continue to grow. Audit and Trace Log Management: Consolidation and Analysis offers a comprehensive introduction and... -
Delivering Police Services Effectively by Garth den Heyer
RRP: £45.99£40.13This book addresses the various strategies that are available to police management, such as consolidation, regionalization, and amalgamation of police agencies; new public management (NPM); enhanced performance management; civilianization; and... -
Practical LTE Based Security Forces PMR Networks by Arnaud Henry-Labordere
RRP: £91.99£79.80Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup... -
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings by Ehab Al-Shaer
RRP: £59.99£53.75This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An...