Computer security Books

Sidebar Sidebar Sidebar
  • Auditing Artificial Intelligence Auditing Artificial Intelligence
    Add to Cart The item has been added

    Auditing Artificial Intelligence

    Auditing Artificial Intelligence is an essential guide for IT auditors, information security experts, and risk management professionals seeking to understand, evaluate, and mitigate AI-related risks.
    $120.00

    Add to Cart The item has been added
  • Cyber Security, Forensics and National Security Cyber Security, Forensics and National Security
    Add to Cart The item has been added

    Cyber Security, Forensics and National Security

    There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architectures.
    $299.00

    Add to Cart The item has been added
  • Practical Internet of Things Security, Second Edition Practical Internet of Things Security, Second Edition
    Add to Cart The item has been added

    Practical Internet of Things Security, Second Edition

    A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey Features:- Learn best practices to secure your data from the device to the cloud- Use...
    $125.00

    Add to Cart The item has been added
  • Advancements in Cybersecurity Advancements in Cybersecurity
    Add to Cart The item has been added

    Advancements in Cybersecurity

    This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, information...
    $410.00

    Add to Cart The item has been added
  • The CISO 3.0 The CISO 3.0
    Add to Cart The item has been added

    The CISO 3.0

    The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise.
    $128.00

    Add to Cart The item has been added
  • Go Where the Bugs Are Go Where the Bugs Are
    Add to Cart The item has been added

    Go Where the Bugs Are

    This Festschrift, dedicated to Wolfgang Reif on the occasion of his 65th birthday, collects contributions written by many of his closest research colleagues and many of his former students.After obtaining his PhD in Karlsruhe in 1991, Wolfgang was...
    $149.00

    Add to Cart The item has been added
  • Security Architect Security Architect
    Add to Cart The item has been added

    Security Architect

    Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies...
    $43.00

    Add to Cart The item has been added
  • Information Security Auditor Information Security Auditor
    Add to Cart The item has been added

    Information Security Auditor

    The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent introduction to the role, covering areas such as purpose, required skills,...
    $43.00

    Add to Cart The item has been added
  • The Cybersecurity Self-Help Guide The Cybersecurity Self-Help Guide
    Add to Cart The item has been added

    The Cybersecurity Self-Help Guide

    This book is an up-to-date self-help guide on Cybersecurity for everyone who connects to the Internet and uses technology. It is an effort to spread awareness about Cybersecurity by explaining techniques and methods to be implemented practically by...
    $282.00

    Add to Cart The item has been added
  • IoT Security Paradigms and Applications IoT Security Paradigms and Applications
    Add to Cart The item has been added

    IoT Security Paradigms and Applications

    Present book highlights these challenges and provide an integrating framework for these technologies illustrating role of blockchain in all the possible facets of IoT security. Further, it investigates the security and privacy issues associated with...
    $398.00

    Add to Cart The item has been added
  • Cybersecurity Fundamentals Cybersecurity Fundamentals
    Add to Cart The item has been added

    Cybersecurity Fundamentals

    Cybersecurity Fundamentals explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. The book covers fundamental issues, using practical examples and...
    $188.00

    Add to Cart The item has been added
  • Cybersecurity in Knowledge Management Cybersecurity in Knowledge Management
    Add to Cart The item has been added

    Cybersecurity in Knowledge Management

    The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine...
    $296.00

    Add to Cart The item has been added
  • Honeypots
    Add to Cart The item has been added

    Honeypots

    A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject...
    $462.00

    Add to Cart The item has been added
  • Smiling Security Smiling Security
    Add to Cart The item has been added

    Smiling Security

    Every business, large and small, is vulnerable to cyber attack. If your company isn't well protected, its systems may be compromised by sophisticated hackers with malicious intentions. Business owners, boards, CEOs, and cyber security managers must work...
    $49.00

    Add to Cart The item has been added
  • Wireless Multimedia Communication Systems Wireless Multimedia Communication Systems
    Add to Cart The item has been added

    Wireless Multimedia Communication Systems

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems:...
    $666.00

    Add to Cart The item has been added
  • Transnational Security Transnational Security
    Add to Cart The item has been added

    Transnational Security

    Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and...
    $297.00

    Add to Cart The item has been added
  • Gang Injunctions and Abatement Gang Injunctions and Abatement
    Add to Cart The item has been added

    Gang Injunctions and Abatement

    As gang violence continues to rise across the country and the world, police departments, prosecutors, and community members are seeking new methods to reduce the spread of gang-related criminal activity. Civil gang injunctions have become a growing...
    $392.00

    Add to Cart The item has been added
  • Introduction to Cryptography with Open-Source Software Introduction to Cryptography with Open-Source Software
    Add to Cart The item has been added

    Introduction to Cryptography with Open-Source Software

    Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of...
    $231.00

    Add to Cart The item has been added
  • Cybersecurity of Discrete Event Systems Cybersecurity of Discrete Event Systems
    Add to Cart The item has been added

    Cybersecurity of Discrete Event Systems

    Su's book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the first in the DES community to provide a thorough introduction of smart cyberattacks on supervisory control systems.
    $237.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Cybersecurity for Decision Makers

    This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
    $308.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Security Implementation in Internet of Medical Things

    This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel...
    $118.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Cyber Security Using Modern Technologies

    The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security...
    $308.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Blockchain and IoT Integration

    The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by "smart" machines. This book explores the platforms and applications of blockchain-enabled...
    $126.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Privacy and Security Challenges in Cloud Computing

    The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT...
    $121.00

    Add to Cart The item has been added
  • Security and Privacy in Internet of Things (IoTs) Security and Privacy in Internet of Things (IoTs)
    Add to Cart The item has been added

    Security and Privacy in Internet of Things (IoTs)

    The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings...
    $118.00

    Add to Cart The item has been added
  • Location Privacy in Wireless Sensor Networks Location Privacy in Wireless Sensor Networks
    Add to Cart The item has been added

    Location Privacy in Wireless Sensor Networks

    Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop...
    $118.00

    Add to Cart The item has been added
  • Securing Cyber-Physical Systems Securing Cyber-Physical Systems
    Add to Cart The item has been added

    Securing Cyber-Physical Systems

    Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems...
    $118.00

    Add to Cart The item has been added
  • Introduction to Certificateless Cryptography Introduction to Certificateless Cryptography
    Add to Cart The item has been added

    Introduction to Certificateless Cryptography

    As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete...
    $118.00

    Add to Cart The item has been added
  • Intrusion Detection and Prevention for Mobile Ecosystems Intrusion Detection and Prevention for Mobile Ecosystems
    Add to Cart The item has been added

    Intrusion Detection and Prevention for Mobile Ecosystems

    This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as...
    $118.00

    Add to Cart The item has been added
  • Empirical Research for Software Security Empirical Research for Software Security
    Add to Cart The item has been added

    Empirical Research for Software Security

    Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting...
    $118.00

    Add to Cart The item has been added
  • Advances in Cryptology Advances in Cryptology
    Add to Cart The item has been added

    Advances in Cryptology

    An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be...
    $122.00

    Add to Cart The item has been added
  • Communication Networks for Smart Grids Communication Networks for Smart Grids
    Add to Cart The item has been added

    Communication Networks for Smart Grids

    This book presents an application-centric approach to the development of smart grid communication architecture. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand...
    $137.00

    Add to Cart The item has been added
  • A Classical Introduction to Cryptography Exercise Book A Classical Introduction to Cryptography Exercise Book
    Add to Cart The item has been added

    A Classical Introduction to Cryptography Exercise Book

    Prehistory of Cryptography.- Conventional Cryptography.- Dedicated Conventional Cryptographic Primitives.- Conventional Security Analysis.- Security Protocols with Conventional Cryptography.- Algorithmic Algebra.- Algorithmic Number Theory.- Elements of...
    $101.00

    Add to Cart The item has been added
  • Economics of Identity Theft Economics of Identity Theft
    Add to Cart The item has been added

    Economics of Identity Theft

    Identity in Economics, and in Context.- Modern Technological and Traditional Social Identities.- Identity Theft.- Who Owns You?.- Defeating the Greatest Masquerade.- Secrecy, Privacy, Identity.- Security and Privacy as Market Failures.- Trusting Code and...
    $171.00

    Add to Cart The item has been added
  • Community Policing in Indigenous Communities Community Policing in Indigenous Communities
    Add to Cart The item has been added

    Community Policing in Indigenous Communities

    Indigenous communities are typically those that challenge the laws of the nation states of which they have become-often very reluctantly-a part. Around the world, community policing has emerged in many of these regions as a product of their physical...
    $282.00

    Add to Cart The item has been added
  • Expert Oracle Application Express Security Expert Oracle Application Express Security
    Add to Cart The item has been added

    Expert Oracle Application Express Security

    Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can enhance security, to preventing SQL Injection and Cross Site Scripting attacks, Expert Oracle...
    $82.00

    Add to Cart The item has been added
Computer security