Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Research Methods for Cyber Security by Thomas W. Edgar 9780128053492
RRP: $138.43Booksplease Price: $125.60Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research... -
Dora: A Guide to the EU Digital Operational Resilience ACT by It Governance Publishing 9781787784512
RRP: $38.90Booksplease Price: $34.20Simplify DORA (EU's Digital Operational Resilience Act) compliance with our concise and insightful guide. Designed for busy professionals, this guide distils key principles and compliance strategies into an easily digestible format. You'll find: ... -
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier 9780393244816
RRP: $38.98Booksplease Price: $36.84Data is everywhere. We create it every time we go online, turn our phone on (or off) or pay with a credit card. This data is stored, studied, bought and sold by companies and governments for surveillance and for control. "Foremost security expert"... -
Regulating Access and Transfer of Data by Björn Lundqvist 9781009335164
RRP: $193.05Booksplease Price: $173.49Data collected and distributed on the internet is generally free, non-exclusive, and non-rivalrous. Yet online data is often difficult to access. This book examines the infrastructure for collecting, storing, and distributing data to show how it is... -
Understanding Cryptography: A Textbook for Students and Practitioners by Bart Preneel 9783642446498
RRP: $64.33Booksplease Price: $57.72Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded... -
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning by Richard Bingley 9781787785199
RRP: $74.00Booksplease Price: $65.93In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to... -
Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection by Bart Baesens
RRP: $76.05Booksplease Price: $51.17Detect fraud earlier to mitigate loss and prevent cascading damage Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques is an authoritative guidebook for setting up a comprehensive fraud detection analytics solution. Early... -
SQL & Nosql Databases: Models, Languages, Consistency Options and Architectures for Big Data Management by Andreas Meier 9783658245481
RRP: $87.73Booksplease Price: $80.98This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look... -
31 Days Before Your CCNP and CCIE Enterprise Core Exam by Patrick Gargano
RRP: $72.13Booksplease Price: $48.69Now updated for the 350-401 ENCOR v1.1 exam release! Digital chapter updates are available for download on the companion website after product registration. The new reprint from Cisco Press will include the latest content. 31 Days Before Your CCNP and... -
Enterprise Security Architecture: A Business-Driven Approach Nicholas Sherwood 9781032099897
RRP: $101.38Booksplease Price: $89.97Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it... -
The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes by Marlon Buchanan 9781958648001
RRP: $32.74Booksplease Price: $22.80Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781958648001Author Marlon BuchananFormat PaperbackPage Count 194Imprint Buchanan Holdings, LLCPublisher Buchanan Holdings, LLCWeight(grams)... -
Security Architect: Careers in information security by Jon Collins
RRP: $38.98Booksplease Price: $36.25Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies... -
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence by Shabaz Darr 9781801811491
Booksplease Price: $71.18Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365 Key Features * Design, implement, and administer Microsoft Information Protection * Implement data loss prevention to minimize the... -
Iso/Iec 27001:2022: An Introduction to Information Security and the Isms Standard by Steven Watkins 9781787784031
RRP: $25.25Booksplease Price: $22.83Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022... -
Coding for Penetration Testers: Building Better Tools by Jason Andress 9780128054727
RRP: $72.13Booksplease Price: $66.51Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of... -
InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe by Jane Frankland 9781781332696
Booksplease Price: $40.97Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781781332696Author Jane FranklandFormat PaperbackPage Count 348Imprint Rethink PressPublisher Rethink PressWeight(grams) 178gDimensions(mm) 216mm * 140mm *... -
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Bruce Schneier (Harvard Kennedy School) 9780393608885
RRP: $42.88Booksplease Price: $36.37We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that... -
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems by Eric D. Knapp 9780124201149
RRP: $107.23Booksplease Price: $98.34As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition... -
Information Security Risk Management for ISO 27001 / ISO 27002 by Alan Calder 9781787781368
RRP: $74.00Booksplease Price: $65.93Protect your information assets with effective risk management In today's information economy, the development, exploitation and protection of information and associated assets are key to the long-term competitiveness and survival of corporations and... -
Acquiring Card Payments Ilya Dubinsky 9781032475332
RRP: $87.73Booksplease Price: $78.45This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes... -
EU GDPR: A Pocket Guide by IT Governance Publishing
Booksplease Price: $24.04Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781849288316Author IT Governance PublishingFormat PaperbackPage Count 1Imprint IT Governance PublishingPublisher IT Governance PublishingWeight(grams)... -
Professional Red Teaming: Conducting Successful Cybersecurity Engagements by Jacob G. Oakley 9781484243084
RRP: $77.98Booksplease Price: $59.85Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is... -
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intr by Nazmul Rajib
Booksplease Price: $114.35The authoritative visual guide to Cisco Firepower Threat Defense (FTD) This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA... -
The Wires of War: Technology and the Global Struggle for Power by Jacob Helberg
RRP: $25.33Booksplease Price: $21.70From the former news policy lead at Google, an "informative and often harrowing wake-up call" (Publishers Weekly) that explains the high-stakes global cyberwar brewing between Western democracies and the authoritarian regimes of China and Russia that... -
Security Risk Assessment: Managing Physical and Operational Security by John M. White 9780128002216
RRP: $72.13Booksplease Price: $65.93Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization's state... -
Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R) Joseph Steinberg 9781466578951
RRP: $144.28Booksplease Price: $127.71The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP (R)) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information... -
How to Destroy Surveillance Capitalism by Cory Doctorow 9781736205907
RRP: $19.48Booksplease Price: $14.78Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781736205907Author Cory DoctorowFormat PaperbackPage Count 146Imprint Medium EditionsPublisher Medium EditionsWeight(grams) 133g -
Certified Kubernetes Security Specialist (CKS) Study Guide: In-Depth Guidance and Practice Benjamin Muschko 9781098132972
RRP: $87.73Booksplease Price: $57.78Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's... -
SELinux Bill Mccarty 9780596007164
RRP: $62.38Booksplease Price: $42.18The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected... -
Principles of Cybercrime by Jonathan Clough 9781107698161
RRP: $103.35Booksplease Price: $90.25Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called... -
Accelerate DevSecOps on AWS: Create secure CI/CD pipelines using Chaos and AIOps by Nikit Swaraj 9781803248608
RRP: $91.63Booksplease Price: $81.51Build high-performance CI/CD pipelines that are powered by AWS and the most cutting-edge tools and techniquesKey FeaturesMaster the full AWS developer toolchain for building high-performance, resilient, and powerful CI/CD pipelinesGet to grips with Chaos... -
Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier (Counterpane Internet Security) 9781118143308
RRP: $40.95Booksplease Price: $27.71In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining... -
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware by Monnappa K A 9781788392501
RRP: $81.88Booksplease Price: $80.61Sorry no description is available for this book at this time. -
How To Create a Web3 Startup: A Guide for Tomorrow's Breakout Companies by Tom Taulli 9781484286821
RRP: $77.98Booksplease Price: $65.50Web3 is the next evolution for the World Wide Web based on Blockchain technology. This book will equip entrepreneurs with the best preparation for the megatrend of Web3 by reviewing its core concepts such as DAOs, tokens, dApps, and Ethereum.With Web2,... -
Quantum Cryptography: From Key Distribution to Conference Key Agreement by Federico Grasselli 9783030643591
RRP: $233.98Booksplease Price: $216.92Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most... -
IBM i Security Administration and Compliance by Carol Woodbury 9781583470275
RRP: $122.85Booksplease Price: $86.19In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know about IBM i security. The definitive IBM i security reference, this Third Edition expands on the examples in previous... -
Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture Brett Crawley 9781804618974
Booksplease Price: $59.85Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutions Key Features Apply threat modeling principles effectively... -
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware by Aditya Sood 9780128006047
RRP: $46.78Booksplease Price: $43.97Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service... -
The Little Black Book of Data and Democracy: From Innocent Tweeting to an Attempted Coup: How social media threatens our very way of life by Kyle Taylor
RRP: $19.48Booksplease Price: $16.40Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781838462901Author Kyle TaylorFormat PaperbackPage Count 148Imprint Byline BooksPublisher Byline Books -
Machine Learning and Security by Clarence Chio 9781491979907
RRP: $103.33Booksplease Price: $68.91Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself...