Add Wish List Add to Cart The item has been added Inside the Dark Web Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground... RRP: $127.87 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Crime Investigator's Field Guide Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition... RRP: $153.95 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Testing and Securing Web Applications Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which... RRP: $346.39 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A Socio-Legal Study of Hacking The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology... RRP: $120.41 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Edge Computing The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge... RRP: $256.13 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Nanoelectronic Devices for Hardware and Software Security Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future... RRP: $269.55 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Insider Threat This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with... RRP: $117.92 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Russian Secret Police This book, first published in 1970, is an important study of Russia's security services from their earliest years to the mid-twentieth century. Ronald Hingley demonstrates how the secret police acted, both under the Tsars and under Soviet rule, as a key... RRP: $336.34 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Problems of Contemporary Militarism This book, first published in 1980, presents a comprehensive and detailed look at the problem of international militarisation. It examines the key issues, the meaning of the problem, the international context and the spread of militarism to the Third... RRP: $375.76 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Security Hippie The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many... RRP: $281.75 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Green Computing in Network Security This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security... RRP: $295.16 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Internet of Energy Handbook The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of... RRP: $295.16 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added IoT Applications, Security Threats, and Countermeasures The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog... RRP: $409.81 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Distributed Denial of Service (DDoS) Attacks The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving... RRP: $127.87 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Cybersecurity Technologies Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human... RRP: $358.59 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added An In-Depth Guide to Mobile Device Forensics Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile... RRP: $307.36 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy and Identity in a Networked Society This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age.Privacy is among the most endangered "species" in our networked society:... RRP: $116.61 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity in the COVID-19 Pandemic This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel,... RRP: $59.19 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in IoT This book explores the variegated perspectives of security in the complex context of Internet of Things. It will beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such... RRP: $114.10 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Searchable Encryption and Data Management This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements... RRP: $59.19 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added An Interdisciplinary Approach to Modern Network Security An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. RRP: $112.85 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Designing Secure Systems Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from padlocks to phishing to enterprise software architecture. RRP: $131.03 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Fifth World Conference on Information Security Education The International Federation for Information Processing (IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The IFIP series encourages education and the... RRP: $121.54 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added New Approaches for Security, Privacy and Trust in Complex Environments The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volume includes papers offering research contributions that focus both... RRP: $226.80 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Critical Information Infrastructures The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various... RRP: $183.11 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Botnet Detection Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security... RRP: $219.36 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptanalytic Attacks on RSA RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks... RRP: $219.36 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Recent Trends in Blockchain for Information Systems Security and Privacy Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social... RRP: $272.27 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Understanding Cybersecurity Technologies Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on... RRP: $230.52 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CyRM Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating... RRP: $95.29 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Managing Information Risk and the Economics of Security Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the... RRP: $334.16 Add to Cart The item has been added