Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
InSecurity: Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe by Jane Frankland 9781781332696
Booksplease Price: $45.53Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781781332696Author Jane FranklandFormat PaperbackPage Count 348Imprint Rethink PressPublisher Rethink PressWeight(grams) 178gDimensions(mm) 216mm * 140mm *... -
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World Bruce Schneier (Harvard Kennedy School) 9780393608885
RRP: $46.18Booksplease Price: $40.19We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the "World-Sized Web". It includes everything from driverless cars to smart thermostats, from billboards that... -
Beginning Ethical Hacking with Python by Sanjib Sinha 9781484225400
RRP: $83.98Booksplease Price: $58.34Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with... -
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems by Eric D. Knapp 9780124201149
RRP: $115.48Booksplease Price: $106.72As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition... -
Information Security Risk Management for ISO 27001 / ISO 27002 by Alan Calder 9781787781368
RRP: $79.70Booksplease Price: $72.85Protect your information assets with effective risk management In today's information economy, the development, exploitation and protection of information and associated assets are key to the long-term competitiveness and survival of corporations and... -
Acquiring Card Payments Ilya Dubinsky 9781032475332
RRP: $100.78Booksplease Price: $91.37This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes... -
EU GDPR: A Pocket Guide by IT Governance Publishing
Booksplease Price: $27.43Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781849288316Author IT Governance PublishingFormat PaperbackPage Count 1Imprint IT Governance PublishingPublisher IT Governance PublishingWeight(grams)... -
Security Risk Assessment: Managing Physical and Operational Security by John M. White 9780128002216
RRP: $77.68Booksplease Price: $72.85Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization's state... -
Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R) Joseph Steinberg 9781466578951
RRP: $163.78Booksplease Price: $147.04The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP (R)) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information... -
How to Destroy Surveillance Capitalism by Cory Doctorow 9781736205907
RRP: $20.98Booksplease Price: $16.49Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781736205907Author Cory DoctorowFormat PaperbackPage Count 146Imprint Medium EditionsPublisher Medium Editions -
Certified Kubernetes Security Specialist (CKS) Study Guide: In-Depth Guidance and Practice Benjamin Muschko 9781098132972
RRP: $94.48Booksplease Price: $65.84Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's... -
Cryptography Panos Louridas 9780262549028
RRP: $35.68Booksplease Price: $26.00A broad introduction to cryptography what it is, how it really works, what its future holds, and why every informed citizen should understand its basics. We all keep secrets from our gym locker codes to our email passwords to our online interactions... -
SELinux Bill Mccarty 9780596007164
RRP: $67.18Booksplease Price: $50.17The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected... -
Principles of Cybercrime by Jonathan Clough 9781107698161
RRP: $111.30Booksplease Price: $97.94Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called... -
Accelerate DevSecOps on AWS: Create secure CI/CD pipelines using Chaos and AIOps by Nikit Swaraj 9781803248608
RRP: $98.68Booksplease Price: $86.84Build high-performance CI/CD pipelines that are powered by AWS and the most cutting-edge tools and techniquesKey FeaturesMaster the full AWS developer toolchain for building high-performance, resilient, and powerful CI/CD pipelinesGet to grips with Chaos... -
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware by Monnappa K A 9781788392501
RRP: $88.18Booksplease Price: $87.49Understand malware analysis and its practical implementation About This Book * Explore the key concepts of malware analysis and memory forensics using real-world examples * Learn the art of detecting, analyzing, and investigating malware threats ... -
Quantum Cryptography: From Key Distribution to Conference Key Agreement by Federico Grasselli 9783030643591
RRP: $251.98Booksplease Price: $235.45Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most... -
IBM i Security Administration and Compliance by Carol Woodbury 9781583470275
RRP: $132.30Booksplease Price: $102.23In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know about IBM i security. The definitive IBM i security reference, this Third Edition expands on the examples in previous... -
Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture Brett Crawley 9781804618974
Booksplease Price: $66.19Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutions Key Features Apply threat modeling principles effectively... -
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware by Aditya Sood 9780128006047
RRP: $50.38Booksplease Price: $48.80Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service... -
The Little Black Book of Data and Democracy: From Innocent Tweeting to an Attempted Coup: How social media threatens our very way of life by Kyle Taylor
RRP: $20.98Booksplease Price: $16.82Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781838462901Author Kyle TaylorFormat PaperbackPage Count 148Imprint Byline BooksPublisher Byline Books -
Machine Learning and Security by Clarence Chio 9781491979907
RRP: $111.28Booksplease Price: $77.39Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself... -
Security Operations in Practice Mike Sheward 9781780175065
RRP: $73.48Booksplease Price: $68.00Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you... -
The Cybersecurity to English Dictionary: 5th Edition by Raef Meeuwisse 9781911452393
RRP: $31.48Booksplease Price: $30.18Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781911452393Author Raef MeeuwisseFormat PaperbackPage Count 164Imprint Cyber Simplicity LtdPublisher Cyber Simplicity LtdDimensions(mm) 203mm * 127mm * 9mm -
Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them by Oleg Skulkin 9781803240442
Booksplease Price: $78.58Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and toolsKey FeaturesUnderstand modern human-operated... -
Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty
RRP: $60.88Booksplease Price: $38.60Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought... -
Official (ISC)2 Guide to the CSSLP CBK Mano Paul (SecuRisk Solutions, Pflugerville, Texas, USA) 9781466571273
RRP: $184.78Booksplease Price: $165.25Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL... -
PCI DSS Version 4.0: A guide to the payment card industry data security standard by Stephen Hancock 9781787785076
RRP: $41.90Booksplease Price: $39.17The PCI DSS (Payment Card Industry Data Security Standard) is now on its fourth version. The withdrawal date for v3.2.1 is 31 March 2024. Many organisations around the world - particularly those that fall below the top tier of payment card transaction... -
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers by Aaron Roberts 9781484272190
RRP: $104.98Booksplease Price: $69.74Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in... -
Designing Secure Software: A Guide for Developers by Loren Kohnfelder
RRP: $100.78Booksplease Price: $58.13Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building... -
Security and Microservice Architecture on AWS Guarav Raje 9781098101466
RRP: $111.28Booksplease Price: $76.76Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their response is more reactive than proactive. That leads to unnecessarily complicated... -
Building Secure Firmware: Armoring the Foundation of the Platform by Jiewen Yao
RRP: $104.98Booksplease Price: $83.45Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its... -
An Introduction to Information Security and ISO 27001: A Pocket Guide by Steve G. Watkins 9781849285261
RRP: $27.20Booksplease Price: $26.50The main international standard that deals with information security is ISO27001. If your organisation is looking to raise employee awareness of information security, then you will find this book especially useful. The pocket guide explains the concept... -
Insider Threat: Prevention, Detection, Mitigation, and Deterrence by Michael G. Gelles 9780128024102
RRP: $83.98Booksplease Price: $78.37Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and... -
Kerberos: The Definitive Guide by Jason Garman 9780596004033
RRP: $83.98Booksplease Price: $62.20Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the large or small. Kerberos makes your network more secure... -
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Bruce Dang 9781118787311
RRP: $88.20Booksplease Price: $80.43Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer... -
Secure Programming Cookbook for C & C++ John Viega 9780596003944
RRP: $125.98Booksplease Price: $91.54Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at... -
Guide to Computer Forensics and Investigations by Amelia Phillips 9781337568944
Booksplease Price: $175.33Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. While other books offer just an... -
Network Attacks and Exploitation: A Framework Matthew Monte 9781118987124
RRP: $75.60Booksplease Price: $69.09Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and... -
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting Rafay Baloch 9781032447193
RRP: $81.88Booksplease Price: $75.81In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This...