Computer security Books

Sidebar Sidebar Sidebar
  • sale
    The Zero Trust Framework The Zero Trust Framework
    Add to Cart The item has been added

    The Zero Trust Framework

    In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
    RRP: $81.39
    $51.00

    Add to Cart The item has been added
  • Continuous Auditing with AI in the Public Sector Continuous Auditing with AI in the Public Sector
    Add to Cart The item has been added

    Continuous Auditing with AI in the Public Sector

    This book deals with the effects of current technological developments in the public sector on auditing and risk management activities. Therefore, it is a resource for public internal auditors. This book will be pioneering work based on CA/CM approaches...
    $168.00

    Add to Cart The item has been added
  • Web Hacking Arsenal Web Hacking Arsenal
    Add to Cart The item has been added

    Web Hacking Arsenal

    The core of this book is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. This proactive approach ensures the book's...
    $282.00

    Add to Cart The item has been added
  • The Evolution of Policing The Evolution of Policing
    Add to Cart The item has been added

    The Evolution of Policing

    Each year, the International Police Executive Symposium (IPES) holds a global conference for police scholars and practitioners to exchange information about the latest trends in police practice and research. Drawn from recent proceedings, The Evolution...
    $137.00

    Add to Cart The item has been added
  • Nan's Secret Password Book Nan's Secret Password Book
    Add to Cart The item has been added

    Nan's Secret Password Book

    A special gift for Nan!A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password...
    $22.00

    Add to Cart The item has been added
  • Grandad's Secret Password Book Grandad's Secret Password Book
    Add to Cart The item has been added

    Grandad's Secret Password Book

    A special gift for Grandad!A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password...
    $22.00

    Add to Cart The item has been added
  • Bitcoin Trading for Beginners, Dummies & Idiots Bitcoin Trading for Beginners, Dummies & Idiots
    Add to Cart The item has been added

    Bitcoin Trading for Beginners, Dummies & Idiots

    Whether you are looking to invest in bitcoin and other cryptocurrencies or understand why it will have a massive impact on your life in the near future, this book will clear out everything you need to know about what makes this technology what it...
    $20.00

    Add to Cart The item has been added
  • Crypto Millionaires Crypto Millionaires
    Add to Cart The item has been added

    Crypto Millionaires

    The story of Blockchain is not just a tale of mathematical experiments. It's primarily a story of the age-old attempt to record human activities and the value that flows from them. This time, however, the goal is to make it accessible to everyone on...
    $308.00

    Add to Cart The item has been added
  • Developing a Security Training Program Developing a Security Training Program
    Add to Cart The item has been added

    Developing a Security Training Program

    Developing a Security Training Program focuses on how to establish a comprehensive training program for a security department from the ground up. The book highlights formal curriculum development, consistent and continual training, the organizational...
    $140.00

    Add to Cart The item has been added
  • The ABCs of LDAP The ABCs of LDAP
    Add to Cart The item has been added

    The ABCs of LDAP

    This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of arguments treated in the various books that are available,...
    $226.00

    Add to Cart The item has been added
  • Global Issues in Contemporary Policing Global Issues in Contemporary Policing
    Add to Cart The item has been added

    Global Issues in Contemporary Policing

    This book addresses six areas of policing: performance management, professional and academic partnerships, preventing and fighting crime and terrorism, immigrant and multicultural populations, policing the police, and cyber-security. The book contains...
    $137.00

    Add to Cart The item has been added
  • It's Your Digital Life It's Your Digital Life
    Add to Cart The item has been added

    It's Your Digital Life

    This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete...
    $282.00

    Add to Cart The item has been added
  • CISO COMPASS CISO COMPASS
    Add to Cart The item has been added

    CISO COMPASS

    #1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021 and 2022!2020 Cybersecurity CANON Hall of Fame WinnerTodd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success,...
    $123.00

    Add to Cart The item has been added
  • Inside the Dark Web Inside the Dark Web
    Add to Cart The item has been added

    Inside the Dark Web

    Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground...
    $128.00

    Add to Cart The item has been added
  • Examining Political Violence Examining Political Violence
    Add to Cart The item has been added

    Examining Political Violence

    Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offenders. This political violence and terrorism plagues all continents and does not originate solely from...
    $282.00

    Add to Cart The item has been added
  • Moving Target Defense Moving Target Defense
    Add to Cart The item has been added

    Moving Target Defense

    A Formal Model for a System's Attack Surface.- Effectiveness of Moving Target Defenses.- Global ISR: Toward a Comprehensive Defense Against.- Compiler-Generated Software Diversity.- Symbiotes and defensive Mutualism: Moving Target Defense.- Manipulating...
    $216.00

    Add to Cart The item has been added
  • The Information Security Dictionary The Information Security Dictionary
    Add to Cart The item has been added

    The Information Security Dictionary

    Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also...
    $285.00

    Add to Cart The item has been added
  • Secure Key Establishment Secure Key Establishment
    Add to Cart The item has been added

    Secure Key Establishment

    Background Materials.- A Flawed BR95 Partnership Function.- On The Key Sharing Requirement.- Comparison of Bellare-Rogaway and Canetti-Krawczyk Models.- An Extension to the Bellare-Rogaway Model.- A Proof of Revised Yahalom Protocol.- Errors in...
    $268.00

    Add to Cart The item has been added
  • Open Source Systems Security Certification Open Source Systems Security Certification
    Add to Cart The item has been added

    Open Source Systems Security Certification

    Basic Notions on Access Control.- Test based security certifications.- Formal methods for software verification.- OSS security certification.- Case Study 1: Linux certification.- Case Study 2: ICSA and CCHIT Certifications.- The role of virtual testing...
    $268.00

    Add to Cart The item has been added
  • Vulnerability Analysis and Defense for the Internet Vulnerability Analysis and Defense for the Internet
    Add to Cart The item has been added

    Vulnerability Analysis and Defense for the Internet

    Wireless Security.- Vulnerability Analysis for Mail Protocols.- Vulnerability Analysis for FTP and TFTP.- Vulnerability Analysis for HTTP.- Vulnerability Analysis for DNS and DHCP.- Vulnerability Analysis for SNMP and LDAP.- Vulnerability Analysis for...
    $249.00

    Add to Cart The item has been added
  • Insider Attack and Cyber Security Insider Attack and Cyber Security
    Add to Cart The item has been added

    Insider Attack and Cyber Security

    The Insider Attack Problem Nature and Scope.- Reflections on the Insider Threat.- The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures.- Data Theft: A Prototypical Insider Threat.- A Survey of Insider Attack Detection Research.-...
    $308.00

    Add to Cart The item has been added
  • Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
    Add to Cart The item has been added

    Multivariate Public Key Cryptosystems

    Overview.- Matsumoto-Imai Cryptosystems.- Oil-Vinegar Signature Schemes.- Hidden Field Equations.- Internal Perturbation.- Triangular Schemes.- Direct Attacks.- Future Research.
    $216.00

    Add to Cart The item has been added
  • Privacy-Respecting Intrusion Detection Privacy-Respecting Intrusion Detection
    Add to Cart The item has been added

    Privacy-Respecting Intrusion Detection

    and Background.- Authorizations.- An Architectural Model for Secure Authorizations.- Traditional Security Objectives.- Personal Data Protection Objectives.- The Challenge: Technical Enforcement of Multilateral Security.- Pseudonyms - A Technical Point of...
    $311.00

    Add to Cart The item has been added
  • Computer Viruses and Malware Computer Viruses and Malware
    Add to Cart The item has been added

    Computer Viruses and Malware

    We've Got Problems.- Definitions and Timeline.- Viruses.- Anti-Virus Techniques.- Anti-Anti-Virus Techniques.- Weaknesses Exploited.- Worms.- Deworming.- "Applications".- People and Communities.- What Should we do?.
    $216.00

    Add to Cart The item has been added
  • CryptoGraphics CryptoGraphics
    Add to Cart The item has been added

    CryptoGraphics

    Graphical Processing Units.- Motivation.- Encryption in GPUs.- Remotely Keyed Cryptographics.- Related Issues.- Extensions.- Conclusions.
    $238.00

    Add to Cart The item has been added
  • Synchronizing Internet Protocol Security (SIPSec) Synchronizing Internet Protocol Security (SIPSec)
    Add to Cart The item has been added

    Synchronizing Internet Protocol Security (SIPSec)

    Research Overview and Conceptual Understanding of Internet Protocol Security (IPSEC).- Internet communication Protocols.- Internet Protocol Versions 4 (IPV4) and 6 (IPV6).- Implementations and Limitations of the IPSEC.- Synchronising Internet Protocol...
    $298.00

    Add to Cart The item has been added
  • Understanding Intrusion Detection through Visualization Understanding Intrusion Detection through Visualization
    Add to Cart The item has been added

    Understanding Intrusion Detection through Visualization

    An Introduction to Intrusion Detection.- The Base-Rate Fallacy and the Difficulty of Intrusion Detection.- Visualizing Intrusions: Watching the Webserver.- Combining a Bayesian Classifier with Visualization: Understanding the IDS.- Visualizing the Inner...
    $238.00

    Add to Cart The item has been added
  • Biometric User Authentication for IT Security Biometric User Authentication for IT Security
    Add to Cart The item has been added

    Biometric User Authentication for IT Security

    Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of...
    $202.00

    Add to Cart The item has been added
  • Unconstrained Face Recognition Unconstrained Face Recognition
    Add to Cart The item has been added

    Unconstrained Face Recognition

    Fundamentals, Preliminaries and Reviews.- Fundamentals.- Preliminaries and Reviews.- Face Recognition Under Variations.- Symmetric Shape from Shading.- Generalized Photometric Stereo.- Illuminating Light Field.- Facial Aging.- Face Recognition Via Kernel...
    $298.00

    Add to Cart The item has been added
  • Image and Video Encryption Image and Video Encryption
    Add to Cart The item has been added

    Image and Video Encryption

    Visual Data Formats.- Cryptography Primer.- Application Scenarios for the Encryption of Visual Data.- Image and Video Encryption.- Conclusions.
    $238.00

    Add to Cart The item has been added
  • Intrusion Detection and Correlation Intrusion Detection and Correlation
    Add to Cart The item has been added

    Intrusion Detection and Correlation

    Computer Security and Intrusion Detection.- Alert Correlation.- Alert Collection.- Alert Aggregation and Verification.- High-Level Alert Structures.- Large-Scale Correlation.- Evaluation.- Open Issues.- Conclusions.
    $238.00

    Add to Cart The item has been added
  • Handbook of Multibiometrics Handbook of Multibiometrics
    Add to Cart The item has been added

    Handbook of Multibiometrics

    Biometrics: When Identity Matters.- Information Fusion in Biometrics.- Levels of Fusion in Biometrics.- Score Level Fusion.- Fusion Incorporating Ancillary Information.
    $294.00

    Add to Cart The item has been added
  • Global Initiatives to Secure Cyberspace Global Initiatives to Secure Cyberspace
    Add to Cart The item has been added

    Global Initiatives to Secure Cyberspace

    The International Landscape of Cyber Security.- A Brief History of Global Responses to Cyber Threats.- International Intergovernmental Organizations.- Regional Intergovernmental Organizations.- Private-Public and Non-Governmental Organizations (NGOs).-...
    $238.00

    Add to Cart The item has been added
  • Trust Management II Trust Management II
    Add to Cart The item has been added

    Trust Management II

    Full Papers.- Trust Management in P2P Systems Using Standard TuLiP.- A Trust Evaluation Method Based on Logic and Probability Theory.- A UML-based Method for the Development of Policies to Support Trust Management.- Analyzing the Robustness of...
    $281.00

    Add to Cart The item has been added
  • Stuxnet to Sunburst Stuxnet to Sunburst
    Add to Cart The item has been added

    Stuxnet to Sunburst

    Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U...
    $282.00

    Add to Cart The item has been added
  • Evidence-Based Cybersecurity Evidence-Based Cybersecurity
    Add to Cart The item has been added

    Evidence-Based Cybersecurity

    The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and...
    $163.00

    Add to Cart The item has been added
  • Controlling Privacy and the Use of Data Assets - Volume 1 Controlling Privacy and the Use of Data Assets - Volume 1
    Add to Cart The item has been added

    Controlling Privacy and the Use of Data Assets - Volume 1

    "Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability."Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays out...
    $154.00

    Add to Cart The item has been added
  • Advances in Systems Safety Advances in Systems Safety
    Add to Cart The item has been added

    Advances in Systems Safety

    Advances in Systems Safety contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK, in February 2011.The Symposium is for engineers, managers and academics in the field of system safety, across...
    $335.00

    Add to Cart The item has been added
  • Cyber Crime Investigator's Field Guide Cyber Crime Investigator's Field Guide
    Add to Cart The item has been added

    Cyber Crime Investigator's Field Guide

    Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition...
    $154.00

    Add to Cart The item has been added
  • Routledge Companion to Global Cyber-Security Strategy Routledge Companion to Global Cyber-Security Strategy
    Add to Cart The item has been added

    Routledge Companion to Global Cyber-Security Strategy

    This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an...
    $564.00

    Add to Cart The item has been added
  • Navigating Cybersecurity Navigating Cybersecurity
    Add to Cart The item has been added

    Navigating Cybersecurity

    Our lives are now deeply intertwined with the digital world, and technology's power has given us access to unparalleled levels of convenience, connectivity, and creativity. The increasing danger of cyber threats is the dark side of this digital...
    $37.00

    Add to Cart The item has been added
  • RMF ISSO RMF ISSO
    Add to Cart The item has been added

    RMF ISSO

    This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into...
    $38.00

    Add to Cart The item has been added
Computer security