Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen 9781098147792
RRP: £47.99Booksplease Price: £32.64Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for... -
The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack 9781394169795
RRP: £24.99Booksplease Price: £17.38A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic... -
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
RRP: £16.99Booksplease Price: £13.06Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780307588692Author Kevin PoulsenFormat PaperbackPage Count 288Imprint Random House IncPublisher Random House USA IncWeight(grams) 236gDimensions(mm) 203mm *... -
The Mobile Application Hacker's Handbook Dominic Chell 9781118958506
RRP: £50.00Booksplease Price: £45.60See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily... -
Linus iptables Pocket Reference Gregor N Purdy 9780596005696
RRP: £7.99Booksplease Price: £6.16Firewalls, Network Address Translation (NAT), and network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever... -
Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation by Karl Gilbert 9781789136722
Booksplease Price: £37.72Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali LinuxKey FeaturesEfficiently perform penetration testing techniques on your public cloud instancesLearn not only to cover loopholes but also to... -
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security by Will Arthur 9781430265832
Booksplease Price: £40.59A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply... -
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities by Megan Roddie 9781801076715
Booksplease Price: £49.30Learn to build, test, and optimize high-fidelity security detections with hands-on labs, real-world scenarios, and industry frameworks like MITRE ATT&CK to master detection engineering and boost your career. Key Features Master the core principles... -
Official (ISC)2 (R) Guide to the ISSAP (R) CBK (ISC)(2) Corporate 9781466579002
RRP: £82.99Booksplease Price: £73.64Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security... -
See Yourself in Cyber: Security Careers Beyond Hacking by Ed Adams 9781394225590
RRP: £21.99Booksplease Price: £15.71A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful... -
Enterprise Security Architecture: A Business-Driven Approach Nicholas Sherwood 9781578203185
RRP: £115.00Booksplease Price: £101.65Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
Cyber Warfare - Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare by Dr. Chase Cunningham 9781839216992
Booksplease Price: £25.92Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on... -
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity Daniel Shoemaker 9781032400211
RRP: £41.99Booksplease Price: £38.37The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area... -
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys by Michael W Lucas 9781642350029
RRP: £24.99Booksplease Price: £20.88Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781642350029Author Michael W LucasFormat PaperbackPage Count 242Imprint Tilted Windmill PressPublisher Tilted Windmill PressWeight(grams) 327gDimensions(mm)... -
ISO 27001/ISO 27002: A Guide to Information Security Management Systems by It Governance Publishing 9781787784932
RRP: £19.95Booksplease Price: £18.65ISO 27001/ISO 27002 - A guide to information security management systems ISO 27001 is one of the leading information security standards. It offers an internationally recognised route for organisations of all sizes and industries to adopt and demonstrate... -
Foundations Of Information Security: A Straightforward Introduction by Jason Andress
RRP: £44.99Booksplease Price: £27.09Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718500044Author Jason AndressFormat PaperbackPage Count 380Imprint No Starch Press,USPublisher No Starch Press,US -
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan
RRP: £19.95Booksplease Price: £16.32"A must-read...It reveals important truths."-Vint Cerf, Internet pioneer"One of the finest books on information security published so far in this century-easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive."-Thomas Rid,... -
Ethical Hacking and Penetration Testing Guide Rafay Baloch 9781482231618
RRP: £61.99Booksplease Price: £56.31Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and... -
Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson 9780128023242
RRP: £58.99Booksplease Price: £54.85Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to... -
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware by Marc Weber Tobias 9781119828259
RRP: £65.00Booksplease Price: £58.35A must-read exploration of lock and physical security from a renowned author and expert In Tobias on Locks and Insecurity Engineering, renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful... -
Research Methods for Cyber Security by Thomas W. Edgar 9780128053492
RRP: £70.99Booksplease Price: £64.91Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research... -
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 by Yvonne Wilson 9781484282601
RRP: £54.99Booksplease Price: £40.73Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity... -
Dora: A Guide to the EU Digital Operational Resilience ACT by It Governance Publishing 9781787784512
RRP: £19.95Booksplease Price: £18.65Simplify DORA (EU's Digital Operational Resilience Act) compliance with our concise and insightful guide. Designed for busy professionals, this guide distils key principles and compliance strategies into an easily digestible format. You'll find: ... -
Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray
RRP: £33.99Booksplease Price: £20.08Readers learn how to leverage human psychology and publicly available information to attack a target. The book includes sections on how to evade detection, spear phish, generate reports, and protect victims to ensure their well-being. Readers learn how... -
Regulating Access and Transfer of Data by Björn Lundqvist 9781009335164
RRP: £99.00Booksplease Price: £79.42Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is... -
Understanding Cryptography: A Textbook for Students and Practitioners by Bart Preneel 9783642446498
Booksplease Price: £34.47Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded... -
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning by Richard Bingley 9781787785199
RRP: £37.95Booksplease Price: £34.69In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to... -
Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection by Bart Baesens
RRP: £39.00Booksplease Price: £26.98Detect fraud earlier to mitigate loss and prevent cascading damage Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early... -
Democracy Hacked: How Technology is Destabilising Global Politics by Martin Moore 9781786074089
Booksplease Price: £17.97In the space of one election cycle, authoritarian governments, moneyed elites and fringe hackers figured out how to game elections, bypass democratic processes, and turn social networks into battlefields. Facebook, Google and Twitter - where our politics... -
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence by Nihad A. Hassan
RRP: £49.99Booksplease Price: £35.11Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and... -
31 Days Before Your CCNP and CCIE Enterprise Core Exam by Patrick Gargano
RRP: £36.99Booksplease Price: £21.17Now updated for the 350-401 ENCOR v1.1 exam release! Digital chapter updates are available for download on the companion website after product registration. The new reprint from Cisco Press will include the latest content. 31 Days Before Your CCNP and... -
Enterprise Security Architecture: A Business-Driven Approach Nicholas Sherwood 9781032099897
RRP: £54.99Booksplease Price: £49.04Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes by Marlon Buchanan 9781958648001
RRP: £16.79Booksplease Price: £12.51Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781958648001Author Marlon BuchananFormat PaperbackPage Count 194Imprint Buchanan Holdings, LLCPublisher Buchanan Holdings, LLCWeight(grams)... -
Security Architect: Careers in information security by Jon Collins
RRP: £19.99Booksplease Price: £19.22Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies... -
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence by Shabaz Darr 9781801811491
Booksplease Price: £37.42Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365Key FeaturesDesign, implement, and administer Microsoft Information ProtectionImplement data loss prevention to minimize the risk of... -
Iso/Iec 27001:2022: An Introduction to Information Security and the Isms Standard by Steven Watkins 9781787784031
RRP: £12.95Booksplease Price: £12.62Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022... -
Coding for Penetration Testers: Building Better Tools by Jason Andress 9780128054727
RRP: £36.99Booksplease Price: £34.99Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of... -
InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe by Jane Frankland 9781781332696
Booksplease Price: £21.68Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781781332696Author Jane FranklandFormat PaperbackPage Count 348Imprint Rethink PressPublisher Rethink PressWeight(grams) 178gDimensions(mm) 216mm * 140mm *... -
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Bruce Schneier (Harvard Kennedy School) 9780393608885
RRP: £21.99Booksplease Price: £19.26We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that... -
Beginning Ethical Hacking with Python by Sanjib Sinha 9781484225400
RRP: £39.99Booksplease Price: £27.95Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with...