Network security Books

Sidebar Sidebar Sidebar
  • Inside the Dark Web Inside the Dark Web
    Add to Cart The item has been added

    Inside the Dark Web

    Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground...
    $127.87

    Add to Cart The item has been added
  • Cyber Crime Investigator's Field Guide Cyber Crime Investigator's Field Guide
    Add to Cart The item has been added

    Cyber Crime Investigator's Field Guide

    Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition...
    $153.95

    Add to Cart The item has been added
  • Testing and Securing Web Applications Testing and Securing Web Applications
    Add to Cart The item has been added

    Testing and Securing Web Applications

    Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which...
    $346.39

    Add to Cart The item has been added
  • A Socio-Legal Study of Hacking A Socio-Legal Study of Hacking
    Add to Cart The item has been added

    A Socio-Legal Study of Hacking

    The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology...
    $120.41

    Add to Cart The item has been added
  • Secure Edge Computing Secure Edge Computing
    Add to Cart The item has been added

    Secure Edge Computing

    The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge...
    $256.13

    Add to Cart The item has been added
  • Nanoelectronic Devices for Hardware and Software Security Nanoelectronic Devices for Hardware and Software Security
    Add to Cart The item has been added

    Nanoelectronic Devices for Hardware and Software Security

    Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future...
    $269.55

    Add to Cart The item has been added
  • The Insider Threat The Insider Threat
    Add to Cart The item has been added

    The Insider Threat

    This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with...
    $117.92

    Add to Cart The item has been added
  • The Russian Secret Police The Russian Secret Police
    Add to Cart The item has been added

    The Russian Secret Police

    This book, first published in 1970, is an important study of Russia's security services from their earliest years to the mid-twentieth century. Ronald Hingley demonstrates how the secret police acted, both under the Tsars and under Soviet rule, as a key...
    $336.34

    Add to Cart The item has been added
  • Problems of Contemporary Militarism Problems of Contemporary Militarism
    Add to Cart The item has been added

    Problems of Contemporary Militarism

    This book, first published in 1980, presents a comprehensive and detailed look at the problem of international militarisation. It examines the key issues, the meaning of the problem, the international context and the spread of militarism to the Third...
    $375.76

    Add to Cart The item has been added
  • The Security Hippie The Security Hippie
    Add to Cart The item has been added

    The Security Hippie

    The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many...
    $281.75

    Add to Cart The item has been added
  • Green Computing in Network Security Green Computing in Network Security
    Add to Cart The item has been added

    Green Computing in Network Security

    This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security...
    $295.16

    Add to Cart The item has been added
  • Internet of Energy Handbook Internet of Energy Handbook
    Add to Cart The item has been added

    Internet of Energy Handbook

    The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of...
    $295.16

    Add to Cart The item has been added
  • IoT Applications, Security Threats, and Countermeasures IoT Applications, Security Threats, and Countermeasures
    Add to Cart The item has been added

    IoT Applications, Security Threats, and Countermeasures

    The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog...
    $409.81

    Add to Cart The item has been added
  • Distributed Denial of Service (DDoS) Attacks Distributed Denial of Service (DDoS) Attacks
    Add to Cart The item has been added

    Distributed Denial of Service (DDoS) Attacks

    The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving...
    $127.87

    Add to Cart The item has been added
  • Advanced Cybersecurity Technologies Advanced Cybersecurity Technologies
    Add to Cart The item has been added

    Advanced Cybersecurity Technologies

    Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human...
    $358.59

    Add to Cart The item has been added
  • An In-Depth Guide to Mobile Device Forensics An In-Depth Guide to Mobile Device Forensics
    Add to Cart The item has been added

    An In-Depth Guide to Mobile Device Forensics

    Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile...
    $307.36

    Add to Cart The item has been added
  • Privacy and Identity in a Networked Society Privacy and Identity in a Networked Society
    Add to Cart The item has been added

    Privacy and Identity in a Networked Society

    This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.Privacy is among the most endangered "species" in our networked society:...
    $116.61

    Add to Cart The item has been added
  • Cybersecurity in the COVID-19 Pandemic Cybersecurity in the COVID-19 Pandemic
    Add to Cart The item has been added

    Cybersecurity in the COVID-19 Pandemic

    This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel,...
    $59.19

    Add to Cart The item has been added
  • Security in IoT Security in IoT
    Add to Cart The item has been added

    Security in IoT

    This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such...
    $114.10

    Add to Cart The item has been added
  • Secure Searchable Encryption and Data Management Secure Searchable Encryption and Data Management
    Add to Cart The item has been added

    Secure Searchable Encryption and Data Management

    This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements...
    $59.19

    Add to Cart The item has been added
  • Designing Secure Systems Designing Secure Systems
    Add to Cart The item has been added

    Designing Secure Systems

    Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. 
    $131.03

    Add to Cart The item has been added
  • Critical Information Infrastructures Critical Information Infrastructures
    Add to Cart The item has been added

    Critical Information Infrastructures

    The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various...
    $183.11

    Add to Cart The item has been added
  • Botnet Detection Botnet Detection
    Add to Cart The item has been added

    Botnet Detection

    Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security...
    $219.36

    Add to Cart The item has been added
  • Cryptanalytic Attacks on RSA Cryptanalytic Attacks on RSA
    Add to Cart The item has been added

    Cryptanalytic Attacks on RSA

    RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks...
    $219.36

    Add to Cart The item has been added
  • Understanding Cybersecurity Technologies Understanding Cybersecurity Technologies
    Add to Cart The item has been added

    Understanding Cybersecurity Technologies

    Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on...
    $230.52

    Add to Cart The item has been added
  • CyRM CyRM
    Add to Cart The item has been added

    CyRM

    Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating...
    $95.29

    Add to Cart The item has been added
Network security