Add Wish List Add to Cart The item has been added Cybersecurity Threats, Malware Trends, and Strategies - Second Edition Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threatsPurchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesProtect your organization from... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Metaverse Investing & Marketing Book Are you looking for exciting new ways to invest?Have you heard of the Metaverse and its amazingly creative opportunities?How would you use it to generate passive income streams that will increase your wealth?The Metaverse is here now, and... RRP: $70.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Bug Bounty from Scratch Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key Features- Prepare to participate in a bug bounty program- Discover your first bug and claim your reward upon successful detection- Go through... RRP: $89.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Education Exploring Cybersecurity Education.This book delves into the critical importance of cybersecurity education, covering a range of topics from the fundamentals of cybersecurity to advanced concepts and techniques, providing readers with a comprehensive... RRP: $140.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Sustainability Cybersecurity Sustainability: Navigating the Evolving Landscape provides a comprehensive and practical guide to the complex world of cybersecurity, covering topics such as governance, risk management, architecture, threat intelligence, privacy,... RRP: $140.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Secrets A must-read for anyone in the health and wellness industry, highlighting the importance of cybersecurity and providing practical strategies to protect sensitive data, secure communication, and navigate emerging technologies.From understanding cyber... RRP: $140.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Crypto Anarchy Crypto Anarchy: Libertarians in the Digital Age explores the concept, principles, and technologies behind crypto anarchy, examining its impact on personal privacy, decentralization, and the future of governance in the digital age. With insights into... RRP: $58.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced Cybersecurity for Critical Infrastructure Are you concerned about the security of critical infrastructure? Advanced Cybersecurity for Critical Infrastructure is an essential guide for protecting vital systems from cyber threats. From risk assessment to incident response, this comprehensive book... RRP: $140.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Implementing Zero-Knowledge Proofs With Practical Applications and Code Examples Implementing Zero-Knowledge Proofs with Practical Applications and Code Examples is a comprehensive guide that explores the theoretical foundations, implementation techniques, and real-world applications of zero-knowledge proofs.With practical code... RRP: $112.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Hacking for the Technically Challenged Get ready for a wild ride with "Hacking for the Technically Challenged: A Noob's Guide" by Black Hat Kathy. This hilarious and informative book will walk you through the basics of hacking, teach you essential techniques, and show you how to apply them in... RRP: $50.59 $47.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Unmasking the Hacker Do you use computers, smart phones and the internet? If you do, please read this book and help protect yourself from cybercrime.There is no solely technical solution to fight cybercrime and neither is there a solely human solution. That is why everyone... RRP: $50.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Governance Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive committed to enhancing their organization's cybersecurity posture, ensuring a robust, informed response to the omnipresent threat of... RRP: $88.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Fingerprinting This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques... RRP: $233.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Understanding Social Engineering Based Scams This book describes trends in email scams and offers tools and techniquesto identify such trends. It also describes automated countermeasuresbased on an understanding of the type of persuasive methods used byscammers. It reviews both consumer-facing... RRP: $194.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Smart Boundaries Shaping a World of Respect: Guarding the Innocence of YouthEmbark on a transformative journey with "Smart Boundaries: Safe Children - A Parent's Handbook", your essential guide to cultivating an environment where innocence thrives and awareness grows... RRP: $29.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added To Click or Not to Click Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophisticated phishing attack that can lead to complete network penetration. Once an adversary has gained network entry, they are in a position to exfiltrate... RRP: $97.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy in Smart Grids Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It... RRP: $163.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Scam! Does this sound familiar?"This call is to inform you about an arrest warrant filed under your name. Please call us back at XXX-XXX-XXXX immediately to resolve this legal matter."If you receive a voicemail like this, your first instinct might be to call... RRP: $26.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Recent Advances in Computational Intelligence and Cyber Security In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computational intelligence and cyber security has become the linchpin of progress. RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Holistic Approach to Quantum Cryptography in Cyber Security The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for graduate students, academic researchers, and professionals in areas including electrical and electronics... RRP: $123.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Analytics This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Future Connected Technologies This book summarizes the progress in the research and provides step by step guide towards every aspect of cloud and other connected technologies. The book also covers the security aspects in the field of Cloud computing, Fog/Edge computing, IoT, etc. RRP: $149.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy Trends in Cloud Computing and Big Data This book explores the security and privacy issues of Cloud Computing and Big Data, providing essential insights into cloud computing and big data integration. RRP: $121.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Introduction to the Cyber Ranges With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cyber Security and Intelligent Analytics The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions,... RRP: $113.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Authorization and Access Control This book focuses on various authorization and access control techniques, threats and attack modelling including overview of open Authorization 2.0 framework along with User managed access and security analysis. Detailed protocol overview and... RRP: $54.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Data Science This book is a useful resource for researchers, software developers, educators and managers who want to understand both the high level concepts as well as the technical details on the design and implementation of secure data science-based systems. It can... RRP: $113.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Data Management for Online Learning Applications This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for online... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added 5G Cyber Risks and Mitigation 5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key... RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity Public Policy This research evaluates 43 countries' cybersecurity public policy utilizing a SWOT analysis, to deliver transparency of the strengths, weaknesses, opportunities, and threats encompassing each of these countries' cybersecurity public policy. RRP: $154.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain for Information Security and Privacy The book presents an integrated view of blockchain for systems security and privacy. It identifies issues of utilizing blockchain in applications including smart contracts, healthcare, and finance. It then explains security and privacy techniques... RRP: $121.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added At Last!! Encoded Totals Second Addition How long have you been thirsting for tempting, tantalizing teasers, craving for challenging cryptographic conundrums? A sequel to ""Have Some Sums to Solve"", this work can satiate the desires of even the most prolific puzzle enthusiast. RRP: $106.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Pentest+ A Practitioners Study Guide The Pentest Plus Practitioner's Study Guide is a condensed study tool designed to aid advanced offensive security professionals as they navigate through the pathways of professional offensive cyber security certifications. "CompTIA PenTest+ is for... RRP: $43.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Modern Cryptology Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be... RRP: $101.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Financial Crimes Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on... RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Global Trafficking in Women and Children War, poverty, and famine; political, social, and economic change; and the deep seated views and rituals rooted in a culture's history and traditions all contribute to the widespread and growing trafficking of women and children. The multilayered... RRP: $126.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Enterprise Level Security 2 Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its... RRP: $203.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Kali Linux, Ethical Hacking And Pen Testing For Beginners At the beginning of this Book, you will get a breakdown of the world of ethical hacking. If you ever wondered what ethical hacking is or what an ethical hacker does, this is for you. This section will be covered by a certified ethical hacker (CEH) and... RRP: $47.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Parent Handbook for Online Safety Internet safety should be like driving. We should teach it before we provide the keys to the car, and we should help guide our children into the right and wrong decisions of "the road." Tech safety doesn't have to feel overwhelming to parents! This... RRP: $18.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Basics of OAuth Securely Connecting Your Applications "Basics of OAuth: Securely Connecting Your Applications" is a concise and informative guide to the OAuth protocol, designed to help web developers, security professionals, and other interested parties understand how OAuth can be used to... RRP: $30.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Preventing 51% Attacks on Bitcoin Exchanges Are you interested in investing in Bitcoin? Before you do, make sure you know the risks involved, particularly when it comes to 51% attacks.What is a 51% attack? How does it work, and what are the consequences for investors and the cryptocurrency... RRP: $23.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Dawn of Distrust In "Dawn of Distrust: Technological Threads Weaving a Trustless Society," embark on a riveting exploration into a future where trust is a relic of the past and transparency reigns supreme. Delve into the intricacies of a society transformed by... RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added 51% Attacks and the Future of Blockchain Security Are you interested in investing in Bitcoin? Before you do, it's important to understand the risks associated with this revolutionary cryptocurrency, including the potential for 51% attacks.In " 51% Attacks and the Future of Blockchain Security" we dive... RRP: $20.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach Master's Thesis from the year 2014 in the subject Computer Science - IT-Security, Lovely Professional University, Punjab, course: M.Tech (Computer Science and Engineering), language: English, abstract: Currently cloud computing environments have come up... RRP: $83.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps Forschungsarbeit aus dem Jahr 2014 im Fachbereich Informatik - IT-Security, Note: 1, Hochschule Aalen, Sprache: Deutsch, Abstract: Diese Arbeit betrachtet die Web-Komponenten: Asp.net Forms, MVC, SignalR und Web Api unter sicherheitskritischen Aspekten... RRP: $99.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyberkriminalität. Bedeutung, Auswirkungen auf digitalisierte Produktions- und Logistikprozesse und Abwehrmaßnahmen Studienarbeit aus dem Jahr 2019 im Fachbereich BWL - Beschaffung, Produktion, Logistik, Note: 1,0, Hochschule Albstadt-Sigmaringen; Sigmaringen, Sprache: Deutsch, Abstract: „Iran im Krieg 2.0 - sehen so die Schlachten der Zukunft aus?"; so betitelte „Die... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity - Data Protection and Strategies The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics related to data protection strategies. Information Technology (IT) students, practitioners, scholars, management and readers who are seeking deeper insight... RRP: $152.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Evolving Roles of Chief Information Security Officers and Chief Risk Officers In "Evolving Roles of Chief Information Security Officers (CISO) and Chief Risk Officers (CRO)," readers will embark on an insightful journey into the heart of organizational security and risk management. With over three years of in-depth research,... RRP: $73.00 Add to Cart The item has been added