Network security Books

Sidebar Sidebar Sidebar
  • Cyber Security, Forensics and National Security Cyber Security, Forensics and National Security
    Add to Cart The item has been added

    Cyber Security, Forensics and National Security

    There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architectures.
    $315.00

    Add to Cart The item has been added
  • Practical Internet of Things Security, Second Edition Practical Internet of Things Security, Second Edition
    Add to Cart The item has been added

    Practical Internet of Things Security, Second Edition

    A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey Features:- Learn best practices to secure your data from the device to the cloud- Use...
    $125.00

    Add to Cart The item has been added
  • Cloud Security and Ai-Driven DevOps Cloud Security and Ai-Driven DevOps
    Add to Cart The item has been added

    Cloud Security and Ai-Driven DevOps

    Cloud Security and AI-Driven DevOps: Next-Generation Software Engineering offers an in-depth exploration of how artificial intelligence, cloud architecture, and DevSecOps are reshaping the foundations of modern software engineering. Written for...
    $44.00

    Add to Cart The item has been added
  • Optimising IoT Networks Optimising IoT Networks
    Add to Cart The item has been added

    Optimising IoT Networks

    The book examines the application of machine learning to enhance resource allocation in IoT networks, with a specific focus on energy efficiency. It discusses various algorithms, including neural networks and reinforcement learning, to optimize resource...
    $205.00

    Add to Cart The item has been added
  • The CISO 3.0 The CISO 3.0
    Add to Cart The item has been added

    The CISO 3.0

    The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise.
    $140.00

    Add to Cart The item has been added
  • The Cybersecurity Self-Help Guide The Cybersecurity Self-Help Guide
    Add to Cart The item has been added

    The Cybersecurity Self-Help Guide

    This book is an up-to-date self-help guide on Cybersecurity for everyone who connects to the Internet and uses technology. It is an effort to spread awareness about Cybersecurity by explaining techniques and methods to be implemented practically by...
    $282.00

    Add to Cart The item has been added
  • Cybersecurity of Discrete Event Systems Cybersecurity of Discrete Event Systems
    Add to Cart The item has been added

    Cybersecurity of Discrete Event Systems

    Su's book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the first in the DES community to provide a thorough introduction of smart cyberattacks on supervisory control systems.
    $237.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Cybersecurity for Decision Makers

    This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
    $308.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Cyber Security Using Modern Technologies

    The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security...
    $308.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Blockchain and IoT Integration

    The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by "smart" machines. This book explores the platforms and applications of blockchain-enabled...
    $126.00

    Add to Cart The item has been added
  • sale
    The Zero Trust Framework The Zero Trust Framework
    Add to Cart The item has been added

    The Zero Trust Framework

    In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
    RRP: $81.39
    $51.00

    Add to Cart The item has been added
  • The Expert in the Next Office The Expert in the Next Office
    Add to Cart The item has been added

    The Expert in the Next Office

    As organizations increasingly depend on electronic information, the lack of systematic training on effective operations and security principles is causing chaos. This book reviews fundamental concepts and practical recommendations for operations and...
    $193.00

    Add to Cart The item has been added
  • Inside the Dark Web Inside the Dark Web
    Add to Cart The item has been added

    Inside the Dark Web

    Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground...
    $128.00

    Add to Cart The item has been added
  • Towards Sustainable Society on Ubiquitous Networks Towards Sustainable Society on Ubiquitous Networks
    Add to Cart The item has been added

    Towards Sustainable Society on Ubiquitous Networks

    The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information...
    $294.00

    Add to Cart The item has been added
  • Evidence-Based Cybersecurity Evidence-Based Cybersecurity
    Add to Cart The item has been added

    Evidence-Based Cybersecurity

    The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and...
    $163.00

    Add to Cart The item has been added
  • Controlling Privacy and the Use of Data Assets - Volume 1 Controlling Privacy and the Use of Data Assets - Volume 1
    Add to Cart The item has been added

    Controlling Privacy and the Use of Data Assets - Volume 1

    "Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability."Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays out...
    $154.00

    Add to Cart The item has been added
  • Cyber Crime Investigator's Field Guide Cyber Crime Investigator's Field Guide
    Add to Cart The item has been added

    Cyber Crime Investigator's Field Guide

    Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition...
    $168.00

    Add to Cart The item has been added
  • Digital Forensics and Incident Response - Second Edition Digital Forensics and Incident Response - Second Edition
    Add to Cart The item has been added

    Digital Forensics and Incident Response - Second Edition

    Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for...
    $131.00

    Add to Cart The item has been added
  • Unveiling the NIST Risk Management Framework (RMF) Unveiling the NIST Risk Management Framework (RMF)
    Add to Cart The item has been added

    Unveiling the NIST Risk Management Framework (RMF)

    Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risksKey Features- Implement NIST RMF with step-by-step instructions for effective security operations- Draw insights...
    $67.00

    Add to Cart The item has been added
  • Cybersecurity Career Master Plan Cybersecurity Career Master Plan
    Add to Cart The item has been added

    Cybersecurity Career Master Plan

    Get started with cybersecurity and progress with the help of expert tips to get certified, find a job, and moreKey Features:Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurityExplore expert tips...
    $109.00

    Add to Cart The item has been added
  • DevSecOps DevSecOps
    Add to Cart The item has been added

    DevSecOps

    A structured approach to integrating security capabilities into your engineering process is an essential requirement for producing secure software without compromising the integrity of the DevOps framework.DevSecOps provides a...
    $36.00

    Add to Cart The item has been added
  • Computer Hacking Computer Hacking
    Add to Cart The item has been added

    Computer Hacking

    COMPUTER HACKINGComputer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking. Inside, you will learn the basics of hacking for beginners.This includes the different types of hacking,...
    $18.00

    Add to Cart The item has been added
  • Cross-Industry Applications of Cyber Security Frameworks Cross-Industry Applications of Cyber Security Frameworks
    Add to Cart The item has been added

    Cross-Industry Applications of Cyber Security Frameworks

    Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as...
    $565.00

    Add to Cart The item has been added
  • Research Anthology on Business Aspects of Cybersecurity Research Anthology on Business Aspects of Cybersecurity
    Add to Cart The item has been added

    Research Anthology on Business Aspects of Cybersecurity

    Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees...
    $1,062.00

    Add to Cart The item has been added
  • Applied Cryptography for Cyber Security and Defense Applied Cryptography for Cyber Security and Defense
    Add to Cart The item has been added

    Applied Cryptography for Cyber Security and Defense

    In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber...
    $407.00

    Add to Cart The item has been added
  • Serious Game Design and Development Serious Game Design and Development
    Add to Cart The item has been added

    Serious Game Design and Development

    The increasing use of games in learning has drawn the attention of numerous disciplines within the scientific community now seeking to understand the nature of its effectiveness and guidance for how to best harness its innovative technology power...
    $407.00

    Add to Cart The item has been added
  • Network Security, Administration and Management Network Security, Administration and Management
    Add to Cart The item has been added

    Network Security, Administration and Management

    The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific...
    $441.00

    Add to Cart The item has been added
  • ICT Ethics and Security in the 21st Century ICT Ethics and Security in the 21st Century
    Add to Cart The item has been added

    ICT Ethics and Security in the 21st Century

    The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption of and access to new products, tools, and software. ICT Ethics and Security in the 21st Century: New...
    $407.00

    Add to Cart The item has been added
  • New Technologies for Digital Crime and Forensics New Technologies for Digital Crime and Forensics
    Add to Cart The item has been added

    New Technologies for Digital Crime and Forensics

    Central to understanding and combating digital crime is the ability to develop new methods for the collection and analysis of electronic evidence. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories,...
    $407.00

    Add to Cart The item has been added
  • Security and Privacy Assurance in Advancing Technologies Security and Privacy Assurance in Advancing Technologies
    Add to Cart The item has been added

    Security and Privacy Assurance in Advancing Technologies

    Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental...
    $407.00

    Add to Cart The item has been added
  • Personal Data Privacy and Protection in a Surveillance Era Personal Data Privacy and Protection in a Surveillance Era
    Add to Cart The item has been added

    Personal Data Privacy and Protection in a Surveillance Era

    In recent years, with rapidly advancing technology and a more globalized culture, the importance of privacy has become paramount. The legal protection of privacy against these new technological threats is a major discussion point in Europe as well as in...
    $407.00

    Add to Cart The item has been added
  • ICT Acceptance, Investment and Organization ICT Acceptance, Investment and Organization
    Add to Cart The item has been added

    ICT Acceptance, Investment and Organization

    The Arab world exhibits its own values and beliefs and poses specific challenges that are reflected on its practices of systems development, implementation and management. ICT is at the forefront of those challenges. ICT Acceptance, Investment and...
    $407.00

    Add to Cart The item has been added
  • The Intelligence Pyramid The Intelligence Pyramid
    Add to Cart The item has been added

    The Intelligence Pyramid

    Build a Proactive Cyber Intelligence Team with Real-World Strategies from Military and Corporate Experts.Building an effective cyber intelligence team is more challenging than ever in a world where cyber threats evolve faster than most organizations can...
    $49.00

    Add to Cart The item has been added
  • Hacking for Beginners Hacking for Beginners
    Add to Cart The item has been added

    Hacking for Beginners

    Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need...
    $26.00

    Add to Cart The item has been added
  • Cyberwatch 101 Cyberwatch 101
    Add to Cart The item has been added

    Cyberwatch 101

    Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your...
    $91.00

    Add to Cart The item has been added
  • OSINT Commando OSINT Commando
    Add to Cart The item has been added

    OSINT Commando

    ����️‍♂️ OSINT COMMANDO Book Bundle ����Are you ready to unlock the secrets of the digital world and become a master of Open-Source Intelligence (OSINT)? Look no further! Introducing the OSINT COMMANDO Book Bundle, your ultimate guide to penetrating...
    $91.00

    Add to Cart The item has been added
Network security