Computer security Books

Sidebar Sidebar Sidebar
  • Image coming soon
    Add to Cart The item has been added

    Metaverse Investing & Marketing Book

    Are you looking for exciting new ways to invest?Have you heard of the Metaverse and its amazingly creative opportunities?How would you use it to generate passive income streams that will increase your wealth?The Metaverse is here now, and...
    $70.00

    Add to Cart The item has been added
  • Bug Bounty from Scratch Bug Bounty from Scratch
    Add to Cart The item has been added

    Bug Bounty from Scratch

    Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key Features- Prepare to participate in a bug bounty program- Discover your first bug and claim your reward upon successful detection- Go through...
    $89.00

    Add to Cart The item has been added
  • Cybersecurity Education Cybersecurity Education
    Add to Cart The item has been added

    Cybersecurity Education

    Exploring Cybersecurity Education.This book delves into the critical importance of cybersecurity education, covering a range of topics from the fundamentals of cybersecurity to advanced concepts and techniques, providing readers with a comprehensive...
    $140.00

    Add to Cart The item has been added
  • Cybersecurity Sustainability Cybersecurity Sustainability
    Add to Cart The item has been added

    Cybersecurity Sustainability

    Cybersecurity Sustainability: Navigating the Evolving Landscape provides a comprehensive and practical guide to the complex world of cybersecurity, covering topics such as governance, risk management, architecture, threat intelligence, privacy,...
    $140.00

    Add to Cart The item has been added
  • Cybersecurity Secrets Cybersecurity Secrets
    Add to Cart The item has been added

    Cybersecurity Secrets

    A must-read for anyone in the health and wellness industry, highlighting the importance of cybersecurity and providing practical strategies to protect sensitive data, secure communication, and navigate emerging technologies.From understanding cyber...
    $140.00

    Add to Cart The item has been added
  • Crypto Anarchy Crypto Anarchy
    Add to Cart The item has been added

    Crypto Anarchy

    Crypto Anarchy: Libertarians in the Digital Age explores the concept, principles, and technologies behind crypto anarchy, examining its impact on personal privacy, decentralization, and the future of governance in the digital age. With insights into...
    $58.00

    Add to Cart The item has been added
  • Advanced Cybersecurity for Critical Infrastructure Advanced Cybersecurity for Critical Infrastructure
    Add to Cart The item has been added

    Advanced Cybersecurity for Critical Infrastructure

    Are you concerned about the security of critical infrastructure? Advanced Cybersecurity for Critical Infrastructure is an essential guide for protecting vital systems from cyber threats. From risk assessment to incident response, this comprehensive book...
    $140.00

    Add to Cart The item has been added
  • sale
    Hacking for the Technically Challenged Hacking for the Technically Challenged
    Add to Cart The item has been added

    Hacking for the Technically Challenged

    Get ready for a wild ride with "Hacking for the Technically Challenged: A Noob's Guide" by Black Hat Kathy. This hilarious and informative book will walk you through the basics of hacking, teach you essential techniques, and show you how to apply them in...
    RRP: $50.59
    $47.00

    Add to Cart The item has been added
  • Unmasking the Hacker Unmasking the Hacker
    Add to Cart The item has been added

    Unmasking the Hacker

    Do you use computers, smart phones and the internet? If you do, please read this book and help protect yourself from cybercrime.There is no solely technical solution to fight cybercrime and neither is there a solely human solution. That is why everyone...
    $50.00

    Add to Cart The item has been added
  • Cybersecurity Governance Cybersecurity Governance
    Add to Cart The item has been added

    Cybersecurity Governance

    Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive committed to enhancing their organization's cybersecurity posture, ensuring a robust, informed response to the omnipresent threat of...
    $88.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Digital Fingerprinting

    This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.  Available techniques...
    $233.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Understanding Social Engineering Based Scams

    This book describes trends in email scams and offers tools and techniquesto identify such trends. It also describes automated countermeasuresbased on an understanding of the type of persuasive methods used byscammers. It reviews both consumer-facing...
    $194.00

    Add to Cart The item has been added
  • Smart Boundaries Smart Boundaries
    Add to Cart The item has been added

    Smart Boundaries

    Shaping a World of Respect: Guarding the Innocence of YouthEmbark on a transformative journey with "Smart Boundaries: Safe Children - A Parent's Handbook", your essential guide to cultivating an environment where innocence thrives and awareness grows...
    $29.00

    Add to Cart The item has been added
  • To Click or Not to Click To Click or Not to Click
    Add to Cart The item has been added

    To Click or Not to Click

    Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophisticated phishing attack that can lead to complete network penetration. Once an adversary has gained network entry, they are in a position to exfiltrate...
    $97.00

    Add to Cart The item has been added
  • Security and Privacy in Smart Grids Security and Privacy in Smart Grids
    Add to Cart The item has been added

    Security and Privacy in Smart Grids

    Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It...
    $163.00

    Add to Cart The item has been added
  • Scam! Scam!
    Add to Cart The item has been added

    Scam!

    Does this sound familiar?"This call is to inform you about an arrest warrant filed under your name. Please call us back at XXX-XXX-XXXX immediately to resolve this legal matter."If you receive a voicemail like this, your first instinct might be to call...
    $26.00

    Add to Cart The item has been added
  • Security Analytics Security Analytics
    Add to Cart The item has been added

    Security Analytics

    This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the...
    $118.00

    Add to Cart The item has been added
  • Future Connected Technologies Future Connected Technologies
    Add to Cart The item has been added

    Future Connected Technologies

    This book summarizes the progress in the research and provides step by step guide towards every aspect of cloud and other connected technologies. The book also covers the security aspects in the field of Cloud computing, Fog/Edge computing, IoT, etc.
    $149.00

    Add to Cart The item has been added
  • Introduction to the Cyber Ranges
    Add to Cart The item has been added

    Introduction to the Cyber Ranges

    With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing...
    $116.00

    Add to Cart The item has been added
  • Advances in Cyber Security and Intelligent Analytics Advances in Cyber Security and Intelligent Analytics
    Add to Cart The item has been added

    Advances in Cyber Security and Intelligent Analytics

    The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions,...
    $113.00

    Add to Cart The item has been added
  • Authorization and Access Control Authorization and Access Control
    Add to Cart The item has been added

    Authorization and Access Control

    This book focuses on various authorization and access control techniques, threats and attack modelling including overview of open Authorization 2.0 framework along with User managed access and security analysis. Detailed protocol overview and...
    $54.00

    Add to Cart The item has been added
  • Secure Data Science Secure Data Science
    Add to Cart The item has been added

    Secure Data Science

    This book is a useful resource for researchers, software developers, educators and managers who want to understand both the high level concepts as well as the technical details on the design and implementation of secure data science-based systems. It can...
    $113.00

    Add to Cart The item has been added
  • Secure Data Management for Online Learning Applications Secure Data Management for Online Learning Applications
    Add to Cart The item has been added

    Secure Data Management for Online Learning Applications

    This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for online...
    $118.00

    Add to Cart The item has been added
  • 5G Cyber Risks and Mitigation 5G Cyber Risks and Mitigation
    Add to Cart The item has been added

    5G Cyber Risks and Mitigation

    5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key...
    $118.00

    Add to Cart The item has been added
  • Cybersecurity Public Policy Cybersecurity Public Policy
    Add to Cart The item has been added

    Cybersecurity Public Policy

    This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy.
    $154.00

    Add to Cart The item has been added
  • Blockchain for Information Security and Privacy Blockchain for Information Security and Privacy
    Add to Cart The item has been added

    Blockchain for Information Security and Privacy

    The book presents an integrated view of blockchain for systems security and privacy. It identifies issues of utilizing blockchain in applications including smart contracts, healthcare, and finance.  It then explains security and privacy techniques...
    $121.00

    Add to Cart The item has been added
  • At Last!! Encoded Totals Second Addition At Last!! Encoded Totals Second Addition
    Add to Cart The item has been added

    At Last!! Encoded Totals Second Addition

    How long have you been thirsting for tempting, tantalizing teasers, craving for challenging cryptographic conundrums? A sequel to ""Have Some Sums to Solve"", this work can satiate the desires of even the most prolific puzzle enthusiast.
    $106.00

    Add to Cart The item has been added
  • Pentest+ A Practitioners Study Guide Pentest+ A Practitioners Study Guide
    Add to Cart The item has been added

    Pentest+ A Practitioners Study Guide

    The Pentest Plus Practitioner's Study Guide is a condensed study tool designed to aid advanced offensive security professionals as they navigate through the pathways of professional offensive cyber security certifications. "CompTIA PenTest+ is for...
    $43.00

    Add to Cart The item has been added
  • Modern Cryptology Modern Cryptology
    Add to Cart The item has been added

    Modern Cryptology

    Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be...
    $101.00

    Add to Cart The item has been added
  • Financial Crimes Financial Crimes
    Add to Cart The item has been added

    Financial Crimes

    Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on...
    $126.00

    Add to Cart The item has been added
  • Global Trafficking in Women and Children Global Trafficking in Women and Children
    Add to Cart The item has been added

    Global Trafficking in Women and Children

    War, poverty, and famine; political, social, and economic change; and the deep seated views and rituals rooted in a culture's history and traditions all contribute to the widespread and growing trafficking of women and children. The multilayered...
    $126.00

    Add to Cart The item has been added
  • Enterprise Level Security 2 Enterprise Level Security 2
    Add to Cart The item has been added

    Enterprise Level Security 2

    Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its...
    $203.00

    Add to Cart The item has been added
  • Kali Linux, Ethical Hacking And Pen Testing For Beginners Kali Linux, Ethical Hacking And Pen Testing For Beginners
    Add to Cart The item has been added

    Kali Linux, Ethical Hacking And Pen Testing For Beginners

    At the beginning of this Book, you will get a breakdown of the world of ethical hacking. If you ever wondered what ethical hacking is or what an ethical hacker does, this is for you. This section will be covered by a certified ethical hacker (CEH) and...
    $47.00

    Add to Cart The item has been added
  • Parent Handbook for Online Safety Parent Handbook for Online Safety
    Add to Cart The item has been added

    Parent Handbook for Online Safety

    Internet safety should be like driving. We should teach it before we provide the keys to the car, and we should help guide our children into the right and wrong decisions of "the road." Tech safety doesn't have to feel overwhelming to parents! This...
    $18.00

    Add to Cart The item has been added
  • Basics of OAuth Securely Connecting Your Applications Basics of OAuth Securely Connecting Your Applications
    Add to Cart The item has been added

    Basics of OAuth Securely Connecting Your Applications

    "Basics of OAuth: Securely Connecting Your Applications" is a concise and informative guide to the OAuth protocol, designed to help web developers, security professionals, and other interested parties understand how OAuth can be used to...
    $30.00

    Add to Cart The item has been added
  • Preventing 51% Attacks on Bitcoin Exchanges Preventing 51% Attacks on Bitcoin Exchanges
    Add to Cart The item has been added

    Preventing 51% Attacks on Bitcoin Exchanges

    Are you interested in investing in Bitcoin? Before you do, make sure you know the risks involved, particularly when it comes to 51% attacks.What is a 51% attack? How does it work, and what are the consequences for investors and the cryptocurrency...
    $23.00

    Add to Cart The item has been added
  • Dawn of Distrust Dawn of Distrust
    Add to Cart The item has been added

    Dawn of Distrust

    In "Dawn of Distrust: Technological Threads Weaving a Trustless Society," embark on a riveting exploration into a future where trust is a relic of the past and transparency reigns supreme. Delve into the intricacies of a society transformed by...
    $27.00

    Add to Cart The item has been added
  • 51% Attacks and the Future of Blockchain Security 51% Attacks and the Future of Blockchain Security
    Add to Cart The item has been added

    51% Attacks and the Future of Blockchain Security

    Are you interested in investing in Bitcoin? Before you do, it's important to understand the risks associated with this revolutionary cryptocurrency, including the potential for 51% attacks.In " 51% Attacks and the Future of Blockchain Security" we dive...
    $20.00

    Add to Cart The item has been added
  • Cybersecurity - Data Protection and Strategies Cybersecurity - Data Protection and Strategies
    Add to Cart The item has been added

    Cybersecurity - Data Protection and Strategies

    The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics related to data protection strategies. Information Technology (IT) students, practitioners, scholars, management and readers who are seeking deeper insight...
    $152.00

    Add to Cart The item has been added
Computer security