Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Computer Forensics For Dummies by Carol Pollard
RRP: £27.99£16.95Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence... -
Cybercrime Prevention: Theory and Applications by Russell Brewer
RRP: £54.99£49.36This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm... -
Application Security Program Handbook by Derek Fisher
RRP: £38.99£23.83Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to implement a robust... -
Poc Gtfo by Manul Laphroaig
RRP: £37.99£24.64This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive... -
Enterprise Security Architecture: A Business-Driven Approach Nicholas Sherwood 9781032099897
RRP: £52.99£46.03Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox Jim Seaman 9781032263892
RRP: £44.99£39.28The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful... -
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Dawn M. Cappelli
RRP: £50.49£38.04Since 2001, the CERT (R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to... -
The Complete Guide to Cybersecurity Risks and Controls Anne Kohnke (Lawrence Technological University, Southfield, Michigan, USA) 9781032402550
RRP: £42.99£37.59The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will... -
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting Rafay Baloch 9781032447193
RRP: £34.99£30.85In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This... -
Cybersecurity Blue Team Toolkit Nadean H. Tanner 9781119552932
RRP: £33.00£21.62A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the... -
Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson 9780128023242
RRP: £58.99£53.68Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to... -
Game Hacking by Nick Cano
RRP: £42.99£29.62You don t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of... -
Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray
RRP: £33.99£19.19Readers learn how to leverage human psychology and publicly available information to attack a target. The book includes sections on how to evade detection, spear phish, generate reports, and protect victims to ensure their well-being. Readers learn how... -
Practical Cryptography by Niels Ferguson
RRP: £34.95£23.43Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead... -
Beyond Fear: Thinking Sensibly About Security in an Uncertain World by Bruce Schneier 9780387026206
RRP: £39.99£31.01Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page... -
Anonymizing Health Data by Khaled El Emam 9781449363079
RRP: £27.99£18.19With this practical book, you will learn proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based... -
We Have Root: Even More Advice from Schneier on Security Bruce Schneier (Counterpane Internet Security, Minneapolis, Minnesota) 9781119643012
RRP: £15.99£11.33A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the... -
CompTIA Cybersecurity Analyst Cert Guide by Troy McMillan
RRP: £36.99£26.88One million cybersecurity jobs will open this year, and many will require strong knowledge and skills in cybersecurity analysis. CompTIA's new vendor-neutral Cybersecurity Analyst (CSA+) IT professional validates the knowledge and skills you'll need to... -
Regulating Access and Transfer of Data by Björn Lundqvist 9781009335164
RRP: £95.00£85.45Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is... -
Introduction to Cryptography with Mathematical Foundations and Computer Implementations Alexander Stanoyevitch 9781439817636
RRP: £96.99£85.05From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present... -
Foundations Of Information Security: A Straightforward Introduction by Jason Andress
RRP: £37.99£21.70Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718500044Author Jason AndressFormat PaperbackPage Count 380Imprint No Starch Press,USPublisher No Starch Press,US -
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response by Leighton Johnson 9781597499965
RRP: £43.99£39.99Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and... -
An Introduction to Mathematical Cryptography by Jeffrey Hoffstein 9781493917105
RRP: £62.99£55.25This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the... -
Advanced API Security: OAuth 2.0 and Beyond by Prabath Siriwardena 9781484220498
RRP: £39.99£29.44Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing... -
Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier (Counterpane Internet Security) 9781118143308
RRP: £21.00£14.36In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining... -
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program by Ryan Leirvik 9781484293188
RRP: £54.99£34.90When it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity... -
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Bruce Dang 9781118787311
RRP: £42.00£37.16Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer... -
SQL & Nosql Databases: Models, Languages, Consistency Options and Architectures for Big Data Management by Andreas Meier 9783658245481
RRP: £44.99£40.58This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look... -
Rootkits And Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov
RRP: £47.99£28.16Security experts Alex Matrosov, Eugene Rodionov, and Sergey Bratus share the knowledge they've gained over years of professional research to help you counter threats. We're talking hard stuff - attacks buried deep in a machine's boot process or UEFI... -
Practical Methods for Legal Investigations: Concepts and Protocols in Civil and Criminal Cases Dean A. Beers, CLI (Forensic Investigators of Colorado, LLC, LaPorte, USA) 9781439844847
RRP: £135.00£117.68Legal investigators are responsible for providing factual evidence - as the fact finders, they are the foundation for the attorneys they work with daily. The attorney is responsible for forming and implementing the legal strategy and presenting it to the... -
Security Architect: Careers in information security by Jon Collins
RRP: £19.99£16.90Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies... -
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware by Abhijit Mohanta
RRP: £74.99£58.05Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis... -
Microsoft Azure Security Infrastructure Yuri Diogenes 9781509303571
RRP: £25.99£19.17Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control,... -
Poc Gtfo Volume 2 by Manul Laphroaig
RRP: £37.99£23.49PoC or GTFO, Volume 2 follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until the release of Volume 1, the journal had only been available... -
100 Top Tips - Stay Safe Online and Protect Your Privacy Nick Vandome 9781840788679
RRP: £5.99£4.40100 Top Tips - Stay Safe Online and Protect Your Privacy contains tips covering all aspects of staying as safe as possible in the online world. These include: Detailing the types of threats that are out there Ensuring that passwords for all of... -
Nessus Network Auditing by Russ Rogers 9781597492089
RRP: £46.99£32.53The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues... -
CompTIA CySA+ Study Guide Exam CS0-002 by Mike Chapple
RRP: £47.50£35.27This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics! Where can you find 100% coverage of the revised CompTIA Cybersecurity... -
Handbook of Digital Forensics and Investigation by Eoghan Casey 9780123742674
RRP: £38.99£36.21Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for... -
Android Security Internals by Nikolay Elenkov
RRP: £47.99£31.51There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals until now. In... -
Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty
RRP: £28.99£16.80Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought...