sale Add Wish List Add to Cart The item has been added The Zero Trust Framework In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography. RRP: $81.39 $51.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Continuous Auditing with AI in the Public Sector This book deals with the effects of current technological developments in the public sector on auditing and risk management activities. Therefore, it is a resource for public internal auditors. This book will be pioneering work based on CA/CM approaches... RRP: $168.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Web Hacking Arsenal The core of this book is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. This proactive approach ensures the book's... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Evolution of Policing Each year, the International Police Executive Symposium (IPES) holds a global conference for police scholars and practitioners to exchange information about the latest trends in police practice and research. Drawn from recent proceedings, The Evolution... RRP: $137.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Nan's Secret Password Book A special gift for Nan!A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password... RRP: $22.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Grandad's Secret Password Book A special gift for Grandad!A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password... RRP: $22.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Bitcoin Trading for Beginners, Dummies & Idiots Whether you are looking to invest in bitcoin and other cryptocurrencies or understand why it will have a massive impact on your life in the near future, this book will clear out everything you need to know about what makes this technology what it... RRP: $20.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to Cybersecurity in the Internet of Things This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture. RRP: $359.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crypto Millionaires The story of Blockchain is not just a tale of mathematical experiments. It's primarily a story of the age-old attempt to record human activities and the value that flows from them. This time, however, the goal is to make it accessible to everyone on... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Providing Integrity, Awareness, and Consciousness in Distributed Dynamic Systems The ideas of this book originates from the mobile WAVE approach which allowed us to implement citywide heterogeneous computer networks and solve distributed problems on them well before the internet. The book is for system scientists, application... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Developing a Security Training Program Developing a Security Training Program focuses on how to establish a comprehensive training program for a security department from the ground up. The book highlights formal curriculum development, consistent and continual training, the organizational... RRP: $140.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The ABCs of LDAP This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of arguments treated in the various books that are available,... RRP: $226.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Global Issues in Contemporary Policing This book addresses six areas of policing: performance management, professional and academic partnerships, preventing and fighting crime and terrorism, immigrant and multicultural populations, policing the police, and cyber-security. The book contains... RRP: $137.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added It's Your Digital Life This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CISO COMPASS #1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022!2020 Cybersecurity CANON Hall of Fame WinnerTodd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success,... RRP: $123.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Inside the Dark Web Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground... RRP: $128.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Examining Political Violence Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offenders. This political violence and terrorism plagues all continents and does not originate solely from... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Moving Target Defense A Formal Model for a System's Attack Surface.- Effectiveness of Moving Target Defenses.- Global ISR: Toward a Comprehensive Defense Against.- Compiler-Generated Software Diversity.- Symbiotes and defensive Mutualism: Moving Target Defense.- Manipulating... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Information Security Dictionary Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also... RRP: $285.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Key Establishment Background Materials.- A Flawed BR95 Partnership Function.- On The Key Sharing Requirement.- Comparison of Bellare-Rogaway and Canetti-Krawczyk Models.- An Extension to the Bellare-Rogaway Model.- A Proof of Revised Yahalom Protocol.- Errors in... RRP: $268.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Open Source Systems Security Certification Basic Notions on Access Control.- Test based security certifications.- Formal methods for software verification.- OSS security certification.- Case Study 1: Linux certification.- Case Study 2: ICSA and CCHIT Certifications.- The role of virtual testing... RRP: $268.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Vulnerability Analysis and Defense for the Internet Wireless Security.- Vulnerability Analysis for Mail Protocols.- Vulnerability Analysis for FTP and TFTP.- Vulnerability Analysis for HTTP.- Vulnerability Analysis for DNS and DHCP.- Vulnerability Analysis for SNMP and LDAP.- Vulnerability Analysis for... RRP: $249.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Insider Attack and Cyber Security The Insider Attack Problem Nature and Scope.- Reflections on the Insider Threat.- The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures.- Data Theft: A Prototypical Insider Threat.- A Survey of Insider Attack Detection Research.-... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Multi-Party Non-Repudiation Protocols and Applications and Fundamentals.- Fundamentals of Non-repudiation.- Multi-Party Non-repudiation.- Multi-Party Non-repudiation: Analysis.- New Design Approaches for MPNR.- Applications.- Multi-Party Non-repudiation Applications.- Scenarios Supported by MPNR Services.-... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Multivariate Public Key Cryptosystems Overview.- Matsumoto-Imai Cryptosystems.- Oil-Vinegar Signature Schemes.- Hidden Field Equations.- Internal Perturbation.- Triangular Schemes.- Direct Attacks.- Future Research. RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy-Respecting Intrusion Detection and Background.- Authorizations.- An Architectural Model for Secure Authorizations.- Traditional Security Objectives.- Personal Data Protection Objectives.- The Challenge: Technical Enforcement of Multilateral Security.- Pseudonyms - A Technical Point of... RRP: $311.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer Viruses and Malware We've Got Problems.- Definitions and Timeline.- Viruses.- Anti-Virus Techniques.- Anti-Anti-Virus Techniques.- Weaknesses Exploited.- Worms.- Deworming.- "Applications".- People and Communities.- What Should we do?. RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Management, Integrity, and Internal Control in Information Systems Security Standards.- Information Security Standards: Adoption Drivers (Invited Paper).- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper).- From XML to RDF: Syntax, Semantics, Security, and Integrity... RRP: $272.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CryptoGraphics Graphical Processing Units.- Motivation.- Encryption in GPUs.- Remotely Keyed Cryptographics.- Related Issues.- Extensions.- Conclusions. RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Synchronizing Internet Protocol Security (SIPSec) Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC).- Internet communication Protocols.- Internet Protocol Versions 4 (IPV4) and 6 (IPV6).- Implementations and Limitations of the IPSEC.- Synchronising Internet Protocol... RRP: $298.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Understanding Intrusion Detection through Visualization An Introduction to Intrusion Detection.- The Base-Rate Fallacy and the Difficulty of Intrusion Detection.- Visualizing Intrusions: Watching the Webserver.- Combining a Bayesian Classifier with Visualization: Understanding the IDS.- Visualizing the Inner... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Warehousing and Data Mining Techniques for Cyber Security An Overview of Data Warehouse, OLAP and Data Mining Technology.- Network and System Security.- Intrusion Detection Systems.- Data Mining for Intrusion Detection.- Data Modeling and Data Warehousing Techniques to Improve Intrusion Detection.- Minds:... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Biometric User Authentication for IT Security Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of... RRP: $202.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Unconstrained Face Recognition Fundamentals, Preliminaries and Reviews.- Fundamentals.- Preliminaries and Reviews.- Face Recognition Under Variations.- Symmetric Shape from Shading.- Generalized Photometric Stereo.- Illuminating Light Field.- Facial Aging.- Face Recognition Via Kernel... RRP: $298.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Privacy, Security and Trust within the Context of Pervasive Computing The Influence of Context on Privacy, Trust and Security.- Some Research Challenges in Pervasive Computing.- Overview.- Survey on Location Privacy in Pervasive Computing.- Exploring the Relationship Between Context and Privacy.- Privacy, Security and... RRP: $294.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Image and Video Encryption Visual Data Formats.- Cryptography Primer.- Application Scenarios for the Encryption of Visual Data.- Image and Video Encryption.- Conclusions. RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Intrusion Detection and Correlation Computer Security and Intrusion Detection.- Alert Correlation.- Alert Collection.- Alert Aggregation and Verification.- High-Level Alert Structures.- Large-Scale Correlation.- Evaluation.- Open Issues.- Conclusions. RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Handbook of Multibiometrics Biometrics: When Identity Matters.- Information Fusion in Biometrics.- Levels of Fusion in Biometrics.- Score Level Fusion.- Fusion Incorporating Ancillary Information. RRP: $294.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Global Initiatives to Secure Cyberspace The International Landscape of Cyber Security.- A Brief History of Global Responses to Cyber Threats.- International Intergovernmental Organizations.- Regional Intergovernmental Organizations.- Private-Public and Non-Governmental Organizations (NGOs).-... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Trust Management II Full Papers.- Trust Management in P2P Systems Using Standard TuLiP.- A Trust Evaluation Method Based on Logic and Probability Theory.- A UML-based Method for the Development of Policies to Support Trust Management.- Analyzing the Robustness of... RRP: $281.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Stuxnet to Sunburst Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U... RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Evidence-Based Cybersecurity The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and... RRP: $163.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Controlling Privacy and the Use of Data Assets - Volume 1 "Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability."Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays out... RRP: $154.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Systems Safety Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.The Symposium is for engineers, managers and academics in the field of system safety, across... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Crime Investigator's Field Guide Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition... RRP: $154.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Routledge Companion to Global Cyber-Security Strategy This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an... RRP: $564.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Navigating Cybersecurity Our lives are now deeply intertwined with the digital world, and technology's power has given us access to unparalleled levels of convenience, connectivity, and creativity. The increasing danger of cyber threats is the dark side of this digital... RRP: $37.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added RMF ISSO This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into... RRP: $38.00 Add to Cart The item has been added