Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age by Steven Levy 9780140244328
Booksplease Price: €24.11If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy the author who made "hackers" a household word comes this account of a revolution that is already... -
Crypto Wars: The Fight for Privacy in the Digital Age: A Political History of Digital Encryption by Craig Jarvis
RRP: €35.69Booksplease Price: €33.92The crypto wars have raged for half a century.In the 1970s, digital privacy activists prophesied the emergence of an Orwellian State, made possible by computer-mediated mass surveillance. The antidote: digital encryption. The U.S. government warned... -
How to Use Customer Data: Navigating GDPR, DPDI and a Future with Marketing AI by Sachiko Scheuing 9781398615151
RRP: €44.02Booksplease Price: €38.78Data-driven marketing is a huge aspect of any modern-day marketing plan, but balancing customers' privacy concerns with the latest innovations can be a complex challenge. When done right, data-driven marketing can build customer trust for... -
Embedded Security in Cars: Securing Current and Future Automotive IT Applications by Kerstin Lemke 9783540283843
Booksplease Price: €110.81Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet... -
Intellectual Property and Open Source Van Lindberg 9780596517960
RRP: €33.31Booksplease Price: €24.54Headlines about lawsuits and policy battles concerning copyrights and patents burst upon the computer field every week. Programmers, system administrators, graphic designers, and many others in computing realize they need to know more about intellectual... -
Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen 9781098147792
RRP: €57.11Booksplease Price: €39.41Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for... -
The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack 9781394169795
RRP: €29.74Booksplease Price: €21.24A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic... -
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen
RRP: €20.22Booksplease Price: €15.99Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780307588692Author Kevin PoulsenFormat PaperbackPage Count 288Imprint Random House IncPublisher Random House USA IncWeight(grams) 236gDimensions(mm) 203mm *... -
The Mobile Application Hacker's Handbook Dominic Chell 9781118958506
RRP: €59.50Booksplease Price: €55.60See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily... -
Linus iptables Pocket Reference Gregor N Purdy 9780596005696
RRP: €9.51Booksplease Price: €7.88Firewalls, Network Address Translation (NAT), and network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever... -
Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation by Karl Gilbert 9781789136722
Booksplease Price: €46.04Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali LinuxKey FeaturesEfficiently perform penetration testing techniques on your public cloud instancesLearn not only to cover loopholes but also to... -
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security by Will Arthur 9781430265832
Booksplease Price: €49.72A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply... -
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities by Megan Roddie 9781801076715
Booksplease Price: €63.63Learn to build, test, and optimize high-fidelity security detections with hands-on labs, real-world scenarios, and industry frameworks like MITRE ATT&CK to master detection engineering and boost your career. Key Features Master the core principles... -
Official (ISC)2 (R) Guide to the ISSAP (R) CBK (ISC)(2) Corporate 9781466579002
RRP: €94.00Booksplease Price: €85.61Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security... -
See Yourself in Cyber: Security Careers Beyond Hacking by Ed Adams 9781394225590
RRP: €26.17Booksplease Price: €18.96A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful... -
Enterprise Security Architecture: A Business-Driven Approach Nicholas Sherwood 9781578203185
RRP: €124.95Booksplease Price: €113.51Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
Cyber Warfare - Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare by Dr. Chase Cunningham 9781839216992
Booksplease Price: €31.64Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on... -
The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity Daniel Shoemaker 9781032400211
RRP: €47.59Booksplease Price: €44.27The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area... -
SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys by Michael W Lucas 9781642350029
RRP: €29.74Booksplease Price: €27.01Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781642350029Author Michael W LucasFormat PaperbackPage Count 242Imprint Tilted Windmill PressPublisher Tilted Windmill PressWeight(grams) 327gDimensions(mm)... -
ISO 27001/ISO 27002: A Guide to Information Security Management Systems by It Governance Publishing 9781787784932
RRP: €23.74Booksplease Price: €22.80ISO 27001/ISO 27002 - A guide to information security management systems ISO 27001 is one of the leading information security standards. It offers an internationally recognised route for organisations of all sizes and industries to adopt and demonstrate... -
Foundations Of Information Security: A Straightforward Introduction by Jason Andress
RRP: €53.54Booksplease Price: €33.83Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781718500044Author Jason AndressFormat PaperbackPage Count 380Imprint No Starch Press,USPublisher No Starch Press,US -
Ethical Hacking and Penetration Testing Guide Rafay Baloch 9781482231618
RRP: €70.20Booksplease Price: €64.90Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and... -
Security Controls Evaluation, Testing, and Assessment Handbook by Leighton Johnson 9780128023242
Booksplease Price: €83.07Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to... -
Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware by Marc Weber Tobias 9781119828259
RRP: €77.35Booksplease Price: €71.13A must-read exploration of lock and physical security from a renowned author and expert In Tobias on Locks and Insecurity Engineering, renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful... -
Research Methods for Cyber Security by Thomas W. Edgar 9780128053492
Booksplease Price: €98.66Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research... -
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 by Yvonne Wilson 9781484282601
RRP: €65.44Booksplease Price: €50.19Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity... -
Dora: A Guide to the EU Digital Operational Resilience ACT by It Governance Publishing 9781787784512
RRP: €23.74Booksplease Price: €22.80Simplify DORA (EU's Digital Operational Resilience Act) compliance with our concise and insightful guide. Designed for busy professionals, this guide distils key principles and compliance strategies into an easily digestible format. You'll find: ... -
Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray
RRP: €40.45Booksplease Price: €24.99Readers learn how to leverage human psychology and publicly available information to attack a target. The book includes sections on how to evade detection, spear phish, generate reports, and protect victims to ensure their well-being. Readers learn how... -
Regulating Access and Transfer of Data by Björn Lundqvist 9781009335164
RRP: €117.81Booksplease Price: €109.40Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is... -
Understanding Cryptography: A Textbook for Students and Practitioners by Bart Preneel 9783642446498
RRP: €39.26Booksplease Price: €37.14Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded... -
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning by Richard Bingley 9781787785199
RRP: €45.16Booksplease Price: €42.35In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to... -
Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection by Bart Baesens
RRP: €46.41Booksplease Price: €32.92Detect fraud earlier to mitigate loss and prevent cascading damage Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early... -
SQL & Nosql Databases: Models, Languages, Consistency Options and Architectures for Big Data Management by Andreas Meier 9783658245481
RRP: €53.54Booksplease Price: €49.42This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look... -
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence by Nihad A. Hassan
RRP: €59.49Booksplease Price: €43.27Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and... -
31 Days Before Your CCNP and CCIE Enterprise Core Exam by Patrick Gargano
RRP: €44.02Booksplease Price: €30.79Now updated for the 350-401 ENCOR v1.1 exam release! Digital chapter updates are available for download on the companion website after product registration. The new reprint from Cisco Press will include the latest content. 31 Days Before Your CCNP and... -
Enterprise Security Architecture: A Business-Driven Approach Nicholas Sherwood 9781032099897
RRP: €61.87Booksplease Price: €56.70Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes by Marlon Buchanan 9781958648001
RRP: €19.98Booksplease Price: €16.56Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781958648001Author Marlon BuchananFormat PaperbackPage Count 194Imprint Buchanan Holdings, LLCPublisher Buchanan Holdings, LLCWeight(grams)... -
Security Architect: Careers in information security by Jon Collins
RRP: €23.79Booksplease Price: €23.49Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies... -
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence by Shabaz Darr 9781801811491
Booksplease Price: €45.68Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365Key FeaturesDesign, implement, and administer Microsoft Information ProtectionImplement data loss prevention to minimize the risk of... -
Iso/Iec 27001:2022: An Introduction to Information Security and the Isms Standard by Steven Watkins 9781787784031
Booksplease Price: €15.46Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022...