Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Evidence-Based Cybersecurity: Foundations, Research, and Practice Pierre-Luc Pomerleau 9781032062785
RRP: £44.99Booksplease Price: £40.23The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and... -
Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments by Peter Rising 9781804611920
Booksplease Price: £34.56Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover techniques to reap... -
Rootkits And Bootkits: Reversing Modern Malware and Next Generation Threats by Alex Matrosov
RRP: £47.99Booksplease Price: £26.69Security experts Alex Matrosov, Eugene Rodionov, and Sergey Bratus share the knowledge they've gained over years of professional research to help you counter threats. We're talking hard stuff - attacks buried deep in a machine's boot process or UEFI... -
SSH, the Secure Shell: The Definitive Guide by Daniel Barrett 9780596008956
RRP: £35.99Booksplease Price: £24.89Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial... -
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware by Abhijit Mohanta
RRP: £74.99Booksplease Price: £60.07Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis... -
TLS Cryptography in Depth: Explore the intricacies of modern cryptography and the inner workings of TLS by Dr. Paul Duplys 9781804611951
Booksplease Price: £39.09A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary reference Key Features Learn about real-world cryptographic pitfalls and how to avoid them Understand past attacks on TLS, how these attacks... -
Effective Physical Security by Lawrence J. Fennelly 9780128044629
RRP: £62.99Booksplease Price: £57.93Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the... -
97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts Christina Morillo 9781098101398
RRP: £39.99Booksplease Price: £26.55Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field... -
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp 9780470747612
RRP: £30.00Booksplease Price: £20.70The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While... -
Model-Driven Risk Analysis: The CORAS Approach by Mass Soldal Lund 9783642123221
Booksplease Price: £46.22The term "risk" is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify... -
Official (ISC)2 Guide to the CISSP CBK Adam Gordon 9781482262759
RRP: £69.99Booksplease Price: £63.71As a result of a rigorous, methodical process that (ISC)(2) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning... -
Democracy Hacked: How Technology is Destabilising Global Politics by Martin Moore
RRP: £9.99Booksplease Price: £7.36Technology has fractured democracy, and now there's no going back. All around the world, the fringes have stormed the palace of the elites and unleashed data miners, dark ads and bots on an unwitting public. After years of soundbites about connecting... -
Management of Information Security by Michael Whitman 9781337405713
Booksplease Price: £80.07MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals... -
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back by Bruce Schneier
RRP: £23.99Booksplease Price: £19.99A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies." And there is an... -
What Is Cybersecurity For? Tim Stevens (King's College London) 9781529226959
RRP: £8.99Booksplease Price: £7.47How will protecting our digital infrastructure shape our future? Cybersecurity is one of the key practical and political challenges of our time. It is at the heart of how modern societies survive and thrive, yet public understanding is still... -
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age by Steven Levy 9780140244328
Booksplease Price: £17.23If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy the author who made "hackers" a household word comes this account of a revolution that is already... -
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption by Craig Jarvis
RRP: £29.99Booksplease Price: £27.03The crypto wars have raged for half a century.In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned... -
How to Use Customer Data: Navigating GDPR, DPDI and a Future with Marketing AI by Sachiko Scheuing 9781398615151
RRP: £36.99Booksplease Price: £31.52Data-driven marketing is a huge aspect of any modern-day marketing plan, but balancing customers' privacy concerns with the latest innovations can be a complex challenge. When done right, data-driven marketing can build customer trust for... -
Embedded Security in Cars: Securing Current and Future Automotive IT Applications by Kerstin Lemke 9783540283843
Booksplease Price: £90.14Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet... -
Beyond Fear: Thinking Sensibly About Security in an Uncertain World by Bruce Schneier 9780387026206
RRP: £39.99Booksplease Price: £31.60Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page... -
Intellectual Property and Open Source Van Lindberg 9780596517960
RRP: £27.99Booksplease Price: £19.47Headlines about lawsuits and policy battles concerning copyrights and patents burst upon the computer field every week. Programmers, system administrators, graphic designers, and many others in computing realize they need to know more about intellectual... -
Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen 9781098147792
RRP: £47.99Booksplease Price: £31.47Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for... -
The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack 9781394169795
RRP: £24.99Booksplease Price: £16.33A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic... -
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
RRP: £16.99Booksplease Price: £12.13Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780307588692Author Kevin PoulsenFormat PaperbackPage Count 288Imprint Random House IncPublisher Random House USA IncWeight(grams) 236gDimensions(mm) 203mm *... -
The Mobile Application Hacker's Handbook Dominic Chell 9781118958506
RRP: £50.00Booksplease Price: £45.26See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily... -
Linus iptables Pocket Reference Gregor N Purdy 9780596005696
RRP: £7.99Booksplease Price: £5.81Firewalls, Network Address Translation (NAT), and network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever... -
Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation by Karl Gilbert 9781789136722
Booksplease Price: £37.36Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux Key Features Efficiently perform penetration testing techniques on your public cloud instances Learn not only to cover loopholes but also to... -
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities by Megan Roddie 9781801076715
Booksplease Price: £49.61Learn to build, test, and optimize high-fidelity security detections with hands-on labs, real-world scenarios, and industry frameworks like MITRE ATT&CK to master detection engineering and boost your career. Key Features Master the core principles... -
Official (ISC)2 (R) Guide to the ISSAP (R) CBK (ISC)(2) Corporate 9781466579002
RRP: £78.99Booksplease Price: £69.70Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security... -
See Yourself in Cyber: Security Careers Beyond Hacking by Ed Adams 9781394225590
RRP: £21.99Booksplease Price: £14.51A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful... -
Enterprise Security Architecture: A Business-Driven Approach Nicholas Sherwood 9781578203185
RRP: £105.00Booksplease Price: £92.44Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
Cyber Warfare - Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare by Dr. Chase Cunningham 9781839216992
Booksplease Price: £25.18Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on... -
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity Daniel Shoemaker 9781032400211
RRP: £39.99Booksplease Price: £35.39The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area... -
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys by Michael W Lucas 9781642350029
RRP: £24.99Booksplease Price: £19.80Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781642350029Author Michael W LucasFormat PaperbackPage Count 242Imprint Tilted Windmill PressPublisher Tilted Windmill PressWeight(grams) 327gDimensions(mm)... -
ISO 27001/ISO 27002: A Guide to Information Security Management Systems by It Governance Publishing 9781787784932
RRP: £19.95Booksplease Price: £17.54ISO 27001/ISO 27002 - A guide to information security management systems ISO 27001 is one of the leading information security standards. It offers an internationally recognised route for organisations of all sizes and industries to adopt and demonstrate... -
Foundations Of Information Security: A Straightforward Introduction by Jason Andress
RRP: £44.99Booksplease Price: £26.19Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718500044Author Jason AndressFormat PaperbackPage Count 380Imprint No Starch Press,USPublisher No Starch Press,US -
Ethical Hacking and Penetration Testing Guide Rafay Baloch 9781482231618
RRP: £58.99Booksplease Price: £52.83Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and... -
Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson 9780128023242
RRP: £58.99Booksplease Price: £54.43Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to... -
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware by Marc Weber Tobias 9781119828259
RRP: £65.00Booksplease Price: £57.90A must-read exploration of lock and physical security from a renowned author and expert In Tobias on Locks and Insecurity Engineering, renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful... -
Research Methods for Cyber Security by Thomas W. Edgar 9780128053492
RRP: £70.99Booksplease Price: £64.41Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research...