Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence by Nihad A. Hassan
RRP: £49.99£35.90Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and... -
Intellectual Property and Open Source: A Practical Guide to Protecting Code by Van Lindberg 9780596517960
RRP: £27.99£18.59Headlines about lawsuits and policy battles concerning copyrights and patents burst upon the computer field every week. Programmers, system administrators, graphic designers, and many others in computing realize they need to know more about intellectual... -
CC Certified in Cybersecurity All-in-One Exam Guide by Jordan Genung
RRP: £44.99£29.60This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity examTake the Certified in Cybersecurity exam from (ISC)2 with confidence using the information contained in this comprehensive study guide. Written by... -
Understanding Cryptography: A Textbook for Students and Practitioners by Bart Preneel 9783642446498
RRP: £32.99£30.04Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded... -
Official (ISC)2 (R) Guide to the ISSAP (R) CBK by (ISC)2
RRP: £74.99£66.35Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security... -
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation by Bruce Dang
RRP: £42.00£37.16Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer... -
The Little Black Book of Data and Democracy: From Innocent Tweeting to an Attempted Coup: How social media threatens our very way of life by Kyle Taylor
RRP: £9.99£7.99Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781838462901Author Kyle TaylorFormat PaperbackPage Count 148Imprint Byline BooksPublisher Byline Books -
CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003) by Nicholas Lane
RRP: £46.99£31.87Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification examTake the challenging CASP exam from CompTIA with total confidence using this highly effective self-study exam guide. Published by the leader in CompTIA... -
CISSP Study Guide by Eric Conrad 9780128024379
£50.66CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified... -
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up by Evan Wheeler 9781597496155
RRP: £39.99£30.73Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students... -
Security Awareness For Dummies by Ira Winkler
RRP: £22.99£15.57Make security a priority on your team Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow... -
Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection by Bart Baesens
RRP: £39.00£25.25Detect fraud earlier to mitigate loss and prevent cascading damage Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early... -
Cybersecurity Risk Management: Mastering the Fundamentals using the NIST Cybersecurity Framework by Cynthia Brumfield
RRP: £87.95£76.38Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a... -
Security Architect: Careers in information security by Jon Collins
£22.37Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies... -
Protecting Information: From Classical Error Correction to Quantum Cryptography by Susan Loepp
RRP: £36.99£32.65For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum... -
Machine Learning and Security by Clarence Chio 9781491979907
RRP: £52.99£34.61Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself... -
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry by Harlan Carvey 9780128032916
RRP: £54.99£48.31Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the... -
Applied Network Security Monitoring: Collection, Detection, and Analysis by Chris Sanders 9780124172081
RRP: £39.99£36.43Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network... -
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long 9781597492157
RRP: £37.99£26.09Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliche goes, information is power. In this age of technology, an increasing majority of the world's information is stored... -
Network Security with OpenSSL by Jon Viega
RRP: £31.99£21.01Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used... -
Designing and Building Security Operations Center by David Nathans 9780128008997
RRP: £36.99£33.26Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are... -
Critical Infrastructure Protection, Risk Management, and Resilience: A Policy Perspective by Kelley Cronin
RRP: £105.00£91.26Critical Infrastructure Protection and Risk Management covers the history of risk assessment, crtical infrastructure protection, and the various structures that make up the homeland security enterprise. The authors examine risk assessment in the public... -
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition by Jayson E. Street 9781597495684
RRP: £23.99£16.53Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network," tells the fictional story of Bob and Leon, two kids caught up in an... -
Cybersecurity by Duane C Wilson
RRP: £15.99£10.93Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262542548Author Duane C. WilsonFormat PaperbackPage Count 160Imprint MIT PressPublisher MIT Press Ltd -
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick 9780764569593
RRP: £34.99£22.43Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and... -
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication by Robert W. Gehl
RRP: £27.00£22.81Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780262543453Author Robert W. GehlFormat PaperbackPage Count 304Imprint MIT PressPublisher MIT Press Ltd -
Inside Cyber Warfare: Mapping the Cyber Underworld by Jeffrey Carr 9781449310042
RRP: £35.99£23.03Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll... -
Professional Penetration Testing: Creating and Learning in a Hacking Lab by Thomas Wilhelm 9781597499934
RRP: £62.99£55.59Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial... -
Threat Intelligence and Me: A Book for Children and Analysts by Jeff Haas 9781541148819
RRP: £10.88£9.38Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781541148819Author Jeff HaasFormat PaperbackPage Count 50Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent Publishing... -
Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy
RRP: £28.00£18.19Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists... -
Foundations of Information Security Based on ISO27001 and ISO27002 by Hans Baars 9789401800129
RRP: £33.99£32.16Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9789401800129Author Hans BaarsFormat PaperbackPage Count 1Imprint Van Haren Publishing BVPublisher Van Haren Publishing BV -
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications by Deep Mehta
RRP: £49.99£36.61Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications... -
Implementing SSL / TLS Using Cryptography and PKI by Joshua Davies
RRP: £50.00£33.35Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer... -
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) by Dawn M. Cappelli
RRP: £50.49£38.04Since 2001, the CERT (R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to... -
Introduction to Security and Network Forensics by William J. Buchanan
RRP: £54.99£48.72Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a... -
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails by Christopher Hadnagy
RRP: £26.99£17.59An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious... -
Online Security for the Older Generation by Jim Gatenby 9780859347754
RRP: £9.99£7.11Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780859347754Author Jim GatenbyFormat PaperbackPage Count 192Imprint Bernard Babani PublishingPublisher Bernard Babani Publishing -
The Browser Hacker's Handbook by Wade Alcorn
RRP: £45.00£40.29Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks... -
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) by Dan Shoemaker
RRP: £44.99£40.28A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework... -
Secrets and Lies: Digital Security in a Networked World by Bruce Schneier
RRP: £24.00£16.17This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just...