Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Protective Security: Creating Military-Grade Defenses for Your Digital Business by Jim Seaman
RRP: €59.49€26.44This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your... -
Designing Secure Software: A Guide for Developers by Loren Kohnfelder
RRP: €57.11€32.77Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building... -
Cyber Security ABCs: Delivering awareness, behaviours and culture change by Jessica Barker
RRP: €29.74€23.07Cybersecurity issues, problems and incidents don't always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness (A), behaviour (B) and culture change (C). These ABCs are key components of the overall... -
Digital Forensics with Open Source Tools by Cory Altheide 9781597495868
RRP: €55.92€52.43Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and... -
Linux iptables Pocket Reference: Pocket Reference by Gregor N. Purdy
RRP: €9.51€6.66Firewalls, Network Address Translation (NAT), and network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever... -
Cybercrime Prevention: Theory and Applications by Russell Brewer
RRP: €65.44€58.74This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm... -
We Have Root: Even More Advice from Schneier on Security by Bruce Schneier
RRP: €19.03€13.48A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the... -
Application Security Program Handbook by Derek Fisher
RRP: €46.40€34.87Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to implement a robust... -
The IoT Architect's Guide to Attainable Security and Privacy: The IoT Architect’s Guide to Attainable by Damilare D. Fagbemi
RRP: €51.16€44.73This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent... -
Gray Hat Python by Justin Seitz 9781593271923
RRP: €45.21€29.07Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no... -
Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson 9780128023242
RRP: €70.20€62.77Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to... -
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity by Daniel Shoemaker 9781032400211
RRP: €46.40€40.72The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area... -
Information Security Governance: A Practical Development and Implementation Approach by Krag Brotby 9780470131183
RRP: €102.28€88.86The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic... -
Enterprise Security Architecture: A Business-Driven Approach by Nicholas Sherwood
RRP: €63.06€54.78Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
Practical Cryptography by Niels Ferguson
RRP: €41.59€27.88Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead... -
Anonymizing Health Data by Khaled El Emam 9781449363079
RRP: €33.31€21.65With this practical book, you will learn proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based... -
Computer Security by Dieter Gollmann 9780470741153
RRP: €64.20€56.22Completely updated and up-to-the-minute textbook for courses on computer science. The third edition has been completely revised to include new advances in software and technology over the last few years. Provides sections on Windows NT, CORBA and Java... -
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework by Jessey Bullock
RRP: €50.58€32.97Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network... -
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response by Leighton Johnson 9781597499965
RRP: €52.35€46.73Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and... -
Introduction to Cryptography with Mathematical Foundations and Computer Implementations by Alexander Stanoyevitch
RRP: €115.42€101.21From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present... -
Foundations Of Information Security: A Straightforward Introduction by Jason Andress
RRP: €45.21€25.86Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718500044Author Jason AndressFormat PaperbackPage Count 380Imprint No Starch Press,USPublisher No Starch Press,US -
Cybersecurity in the COVID-19 Pandemic by Kenneth Okereafor 9780367721435
RRP: €22.60€20.08As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for... -
An Introduction to Mathematical Cryptography by Jeffrey Hoffstein 9781493917105
RRP: €74.96€67.58This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the... -
Liars and Outliers: Enabling the Trust that Society Needs to Thrive by Bruce Schneier
RRP: €24.99€17.09In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining... -
Rootkits And Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov
RRP: €57.11€34.14Security experts Alex Matrosov, Eugene Rodionov, and Sergey Bratus share the knowledge they've gained over years of professional research to help you counter threats. We're talking hard stuff - attacks buried deep in a machine's boot process or UEFI... -
Practical Methods for Legal Investigations: Concepts and Protocols in Civil and Criminal Cases by Dean A. Beers
RRP: €160.65€140.04Legal investigators are responsible for providing factual evidence - as the fact finders, they are the foundation for the attorneys they work with daily. The attorney is responsible for forming and implementing the legal strategy and presenting it to the... -
CompTIA CySA+ Study Guide Exam CS0-002 by Mike Chapple
RRP: €56.53€43.53This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics! Where can you find 100% coverage of the revised CompTIA Cybersecurity... -
Microsoft Azure Security Infrastructure by Yuri Diogenes
RRP: €30.93€22.81Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control,... -
Poc Gtfo Volume 2 by Manul Laphroaig
RRP: €45.21€30.26PoC or GTFO, Volume 2 follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until the release of Volume 1, the journal had only been available... -
100 Top Tips - Stay Safe Online and Protect Your Privacy by Nick Vandome 9781840788679
RRP: €7.13€5.24100 Top Tips - Stay Safe Online and Protect Your Privacy contains tips covering all aspects of staying as safe as possible in the online world. These include: Detailing the types of threats that are out there Ensuring that passwords for all of... -
Nessus Network Auditing by Russ Rogers 9781597492089
RRP: €55.92€38.00The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues... -
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks by Mohssen Mohammed 9780367380038
RRP: €67.82€58.80Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on... -
Insider Threat: Prevention, Detection, Mitigation, and Deterrence by Michael G. Gelles 9780128024102
RRP: €47.59€42.16Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and... -
Effective Physical Security by Lawrence J. Fennelly 9780128044629
RRP: €74.96€66.87Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the... -
Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty
RRP: €34.50€20.36Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought... -
Security for Web Developers by John Paul Mueller 9781491928646
RRP: €47.59€31.59As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new... -
Building a Cyber Risk Management Program: Evolving Security for the Digital Age by Brian Allen 9781098147792
RRP: €57.11€37.02Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for... -
SELinux by Bill McCarty 9780596007164
RRP: €38.07€24.53The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected... -
Zero Trust Security: An Enterprise Guide by Jason Garbis 9781484267011
RRP: €59.49€41.39Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute... -
Cybersecurity Blue Team Toolkit by Nadean H. Tanner 9781119552932
RRP: €39.27€25.73A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the...