Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Optimal Spending on Cybersecurity Measures: Third Party Risk Management Tara Kissoon 9781032959351
RRP: £110.00Booksplease Price: £95.36The aim of this book is to demonstrate the use of business-driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third-party arrangements, and emphasizes that organisations retain... -
Optimal Spending on Cybersecurity Measures: AI and Governance Tara Kissoon 9781032959337
RRP: £110.00Booksplease Price: £95.36Optimal Spending on Cybersecurity Measures: AI and GovernanceThe aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to... -
CyberMedics: Navigating AI and Security in the Medical Field Varun Sapra 9781032847023
RRP: £115.00Booksplease Price: £99.26"CyberMedics: Navigating AI and Security in the Medical Field" is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world... -
Principle & Applications of Blockchain Systems: How to Overcome the Cap Trilemma in Consortium Blockchain Hui Liu 9781394237227
RRP: £112.00Booksplease Price: £97.04Technical theory, key technologies, and practical applications for consortium blockchains, with a solution to the CAP trilemma problem Principles and Applications of Blockchain Systems provides a comprehensive introduction to consortium blockchains,... -
Securing Microsoft Azure OpenAI Karl Ots 9781394291090
RRP: £42.50Booksplease Price: £37.80Unlock the power of AI while ensuring your data security and customer privacy In Securing Microsoft Azure OpenAI, author Karl Ots delivers an essential guide to harnessing the vast AI capabilities of Microsoft Azure, with a strong emphasis on data... -
Security Issues for Wireless Sensor Networks Parag Verma 9781032190853
RRP: £41.99Booksplease Price: £37.07Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to... -
Security and Privacy Trends in Cloud Computing and Big Data Muhammad Imran Tariq 9781032261690
RRP: £45.99Booksplease Price: £41.08It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud... -
Securing Organizations with NIST CSF 2.0: Learn the practical application of the NIST Cybersecurity Framework 2.0 Jason Brown 9781835463079
Booksplease Price: £34.56Launch and enhance your cybersecurity program by adopting and implementing the NIST Cybersecurity Framework 2.0 Key Features Leverage the NIST Cybersecurity Framework to align your program with best practices Gain an in-depth understanding of the... -
5G Cyber Risks and Mitigation Sabhyata Soni 9781032206134
RRP: £44.99Booksplease Price: £40.235G technology is the next step in the evolution of wireless communication. It offers faster speeds and more bandwidth than 4G. One of the biggest differences between 4G and 5G is that 5G will be used for a wider range of applications. This makes it ideal... -
Cyber Crime Investigator's Field Guide Bruce Middleton 9781032301891
RRP: £44.99Booksplease Price: £40.23Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide, Third Edition... -
Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries Bradley Fowler 9781032194349
RRP: £58.99Booksplease Price: £52.03Since 2000, many governments, parliaments, and ministries have worked diligently to define effective guidelines that safeguard both public and private sector information systems, as well as information assets, from unwanted cyberattacks and unauthorized... -
Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I Haixin Duan 9783031649479
Booksplease Price: £80.08This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully... -
Privacy in Vehicular Networks: Challenges and Solutions Baihe Ma 9781032854175
RRP: £48.99Booksplease Price: £43.61In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge. Privacy in Vehicular Networks delves into the complexities of protecting sensitive location data... -
Secure Edge Computing: Applications, Techniques and Challenges Mohiuddin Ahmed 9781032056326
RRP: £44.99Booksplease Price: £40.23The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge... -
Segment Routing in MPLS Networks: Practical labs for transitioning from traditional MPLS to SR-MPLS with TI-LFA FRR Hemant Sharma 9781836203216
Booksplease Price: £34.56Unlock the power of Segment Routing (SR-MPLS) and fast reroute (FRR) techniques through immersive hands-on labs, revolutionizing your understanding and implementation of next-gen MPLS protocol Key Features Work through practical labs to learn how to... -
AWS Security Cookbook: Practical solutions for securing AWS cloud infrastructure with essential services and best practices Heartin Kanikathottu 9781835081891
Booksplease Price: £35.08Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, while following cloud security best practices Key Features Explore useful recipes for implementing robust cloud security solutions on AWS... -
Advances in Cyber Security and Intelligent Analytics Abhishek Verma 9781032216010
RRP: £42.99Booksplease Price: £37.90We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive... -
Big Data Analytics in Fog-Enabled IoT Networks: Towards a Privacy and Security Perspective Govind P. Gupta 9781032206455
RRP: £44.99Booksplease Price: £40.23The integration of fog computing with the resource-limited Internet of Things (IoT) network formulates the concept of the fog-enabled IoT system. Due to a large number of IoT devices, the IoT is a main source of Big Data. A large volume of sensing data... -
Split Federated Learning for Secure IoT Applications: Concepts, frameworks, applications and case studies Gururaj Harinahalli Lokesh 9781839539459
RRP: £155.00Booksplease Price: £107.66New approaches in federated learning and split learning have the potential to significantly improve ubiquitous intelligence in internet of things (IoT) applications. In split federated learning, the machine learning model is divided into smaller network... -
Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II Haixin Duan 9783031649530
Booksplease Price: £80.08This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully... -
Bash Shell Scripting for Pentesters: Master the art of command-line exploitation and enhance penetration testing workflows Steve Campbell 9781835880821
Booksplease Price: £35.08Gain practical knowledge and insights by performing advanced system reconnaissance and streamlining offensive operations by using command-line scripting Key Features Learn how to apply key attributes of Bash to accomplish common penetration testing... -
IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing Lewis Heuermann 9781835467930
Booksplease Price: £30.69Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manual Key Features Secure and audit endpoints in Windows environments for robust defense Gain practical skills in... -
IDS and IPS with Snort 3.0: Get up and running with Snort 3.0 and discover effective solutions to your security issues Ashley Thomas 9781800566163
Booksplease Price: £30.69Learn the essentials of Snort 3.0, including installation, configuration, system architecture, and tuning to develop effective intrusion detection and prevention solutions with this easy-to-follow guide Key Features Grasp the fundamentals of IDS/IPS and... -
Practical Cyber Intelligence: A Hands-on Guide to Digital Forensics Adam Tilmar Jakobsen 9781394256099
RRP: £79.50Booksplease Price: £69.63Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures... -
Black Hat Bash: Bash Scripting for Hackers and Pentesters Nick Aleks 9781718503748
RRP: £56.99Booksplease Price: £33.61Bash is one of the first building blocks that expert penetration testers learn. But every hacker, regardless of experience level, should know their way around a bash shell - its powerful scripting language lets you scale your attacks and write your own... -
Developing Cybersecurity Programs and Policies in an AI-Driven World Omar Santos 9780138074104
RRP: £66.99Booksplease Price: £49.61Developing Cybersecurity Programs and Policies is a complete guide to establishing a cyber security program and governance in your organization. In this book, you will learn how to create cyber security policies, standards, procedures, guidelines, and...