Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
The Mobile Application Hacker's Handbook Dominic Chell 9781118958506
RRP: $64.50$57.42See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily... -
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting Rafay Baloch 9781032447193
RRP: $45.14$39.80In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This... -
Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson 9780128023242
RRP: $76.10$69.25Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to... -
Game Hacking by Nick Cano
RRP: $55.46$38.21You don t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of... -
Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray
RRP: $43.85$24.76Readers learn how to leverage human psychology and publicly available information to attack a target. The book includes sections on how to evade detection, spear phish, generate reports, and protect victims to ensure their well-being. Readers learn how... -
Practical Cryptography by Niels Ferguson
RRP: $45.09$30.22Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead... -
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh 9780470613030 [USED COPY]
RRP: $61.28$4.39A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems... -
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh 9780470613030
RRP: $61.28$54.71A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems... -
Regulating Access and Transfer of Data by Björn Lundqvist 9781009335164
RRP: $122.55$110.23Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is... -
Foundations Of Information Security: A Straightforward Introduction by Jason Andress
RRP: $49.01$27.99Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718500044Author Jason AndressFormat PaperbackPage Count 380Imprint No Starch Press,USPublisher No Starch Press,US -
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response by Leighton Johnson 9781597499965
RRP: $56.75$51.59Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and... -
An Introduction to Mathematical Cryptography by Jeffrey Hoffstein 9781493917105
RRP: $81.26$71.27This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the... -
Advanced API Security: OAuth 2.0 and Beyond by Prabath Siriwardena 9781484220498
RRP: $51.59$37.98Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing... -
Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier (Counterpane Internet Security) 9781118143308
RRP: $27.09$18.52In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining... -
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program by Ryan Leirvik 9781484293188
RRP: $70.94$45.02When it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity... -
SQL & Nosql Databases: Models, Languages, Consistency Options and Architectures for Big Data Management by Andreas Meier 9783658245481
RRP: $58.04$52.35This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look... -
Rootkits And Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov
RRP: $61.91$36.33Security experts Alex Matrosov, Eugene Rodionov, and Sergey Bratus share the knowledge they've gained over years of professional research to help you counter threats. We're talking hard stuff - attacks buried deep in a machine's boot process or UEFI... -
Practical Methods for Legal Investigations: Concepts and Protocols in Civil and Criminal Cases Dean A. Beers, CLI (Forensic Investigators of Colorado, LLC, LaPorte, USA) 9781439844847
RRP: $174.15$151.81Legal investigators are responsible for providing factual evidence - as the fact finders, they are the foundation for the attorneys they work with daily. The attorney is responsible for forming and implementing the legal strategy and presenting it to the... -
Kerberos: The Definitive Guide by Jason Garman 9780596004033
RRP: $51.59$33.73Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the large or small. Kerberos makes your network more secure... -
Security Architect: Careers in information security by Jon Collins
RRP: $25.79$21.80Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies... -
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware by Abhijit Mohanta
RRP: $96.74$74.88Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis... -
Microsoft Azure Security Infrastructure Yuri Diogenes 9781509303571
RRP: $33.53$24.73Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control,... -
Poc Gtfo Volume 2 by Manul Laphroaig
RRP: $49.01$30.30PoC or GTFO, Volume 2 follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until the release of Volume 1, the journal had only been available... -
100 Top Tips - Stay Safe Online and Protect Your Privacy Nick Vandome 9781840788679
RRP: $7.73$5.68100 Top Tips - Stay Safe Online and Protect Your Privacy contains tips covering all aspects of staying as safe as possible in the online world. These include: Detailing the types of threats that are out there Ensuring that passwords for all of... -
Secrets and Lies: Digital Security in a Networked World Bruce Schneier 9781119092438
RRP: $30.96$20.86This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just... -
Nessus Network Auditing by Russ Rogers 9781597492089
RRP: $60.62$41.96The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues... -
Android Security Internals by Nikolay Elenkov
RRP: $61.91$40.65There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals until now. In... -
We Have Root: Even More Advice from Schneier on Security Bruce Schneier (Counterpane Internet Security, Minneapolis, Minnesota) 9781119643012
RRP: $20.63$14.62A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the... -
Effective Physical Security by Lawrence J. Fennelly 9780128044629
RRP: $81.26$73.76Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the... -
Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty
RRP: $37.40$21.67Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought... -
Security for Web Developers John Paul Mueller 9781491928646
RRP: $51.59$34.25As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new... -
Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen 9781098147792
RRP: $61.91$40.13Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for... -
Gray Hat C: A Hacker's Guide to Creating and Automating Security Tools by Brandon Perry
RRP: $61.91$40.65Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run... -
SELinux Bill Mccarty 9780596007164
RRP: $41.27$26.59The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected... -
CompTIA CySA+ Study Guide Exam CS0-002 by Mike Chapple
RRP: $61.28$45.27This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics! Where can you find 100% coverage of the revised CompTIA Cybersecurity... -
Zero Trust Security: An Enterprise Guide by Jason Garbis 9781484267011
RRP: $64.49$41.93Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute... -
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations by Morey J. Haber
RRP: $51.59$36.71Build an effective vulnerability management strategy to protect your organization's assets, applications, and data.Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern... -
Privacy Is Hard and Seven Other Myths: Achieving Privacy Through Careful Design by Jaap-Henk Hoepman
RRP: $34.83$22.69Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262045827Author Jaap-Henk HoepmanFormat HardbackPage Count 256Imprint MIT PressPublisher MIT Press Ltd -
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier 9780393357448
RRP: $18.05$14.84We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that... -
Official (ISC)2 (R) Guide to the ISSAP (R) CBK (ISC)(2) Corporate 9781466579002
RRP: $96.74$85.59Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security...