Computer security Books

Sidebar Sidebar Sidebar
  • Cybersecurity - Data Protection and Strategies Cybersecurity - Data Protection and Strategies
    Add to Cart The item has been added

    Cybersecurity - Data Protection and Strategies

    The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics related to data protection strategies. Information Technology (IT) students, practitioners, scholars, management and readers who are seeking deeper insight...
    $152.00

    Add to Cart The item has been added
  • Cyberwar, Cyberterror, Cybercrime Cyberwar, Cyberterror, Cybercrime
    Add to Cart The item has been added

    Cyberwar, Cyberterror, Cybercrime

    Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same - but the outcomes can be equally devastating. Each...
    $88.00

    Add to Cart The item has been added
  • OSINT Hacker's Arsenal OSINT Hacker's Arsenal
    Add to Cart The item has been added

    OSINT Hacker's Arsenal

    Introducing the "OSINT Hacker's Arsenal" Book Bundle!Unlock the Power of Open Source Intelligence (OSINT) with our comprehensive book bundle, carefully crafted to take you from a novice to a seasoned OSINT professional. With a combined wealth of...
    $91.00

    Add to Cart The item has been added
  • Defense In Depth Defense In Depth
    Add to Cart The item has been added

    Defense In Depth

    Introducing the "Defense in Depth" Book BundleAre you concerned about the ever-growing threats to your digital world? Do you want to fortify your network security and bolster your cyber resilience? Look no further - the "Defense in Depth" book bundle is...
    $80.00

    Add to Cart The item has been added
  • SQL Injection Strategies SQL Injection Strategies
    Add to Cart The item has been added

    SQL Injection Strategies

    Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey FeaturesUnderstand SQL injection and its effects on websites and other systemsGet hands-on with SQL...
    $81.00

    Add to Cart The item has been added
  • Mastering Cloud Security Posture Management (CSPM) Mastering Cloud Security Posture Management (CSPM)
    Add to Cart The item has been added

    Mastering Cloud Security Posture Management (CSPM)

    Strengthen your security posture in all aspects of CSPM technology, from security infrastructure design to implementation strategies, automation, and remedial actions using operational best practices across your cloud environmentKey FeaturesChoose the...
    $98.00

    Add to Cart The item has been added
  • Mastering Microsoft Defender for Office 365 Mastering Microsoft Defender for Office 365
    Add to Cart The item has been added

    Mastering Microsoft Defender for Office 365

    Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategiesKey Features:- Integrate Microsoft Defender for Office 365 fits into your...
    $98.00

    Add to Cart The item has been added
  • IT Audit Field Manual IT Audit Field Manual
    Add to Cart The item has been added

    IT Audit Field Manual

    Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manualKey Features:- Secure and audit endpoints in Windows environments for robust defense- Gain practical skills in...
    $89.00

    Add to Cart The item has been added
  • Microsoft Unified XDR and SIEM Solution Handbook Microsoft Unified XDR and SIEM Solution Handbook
    Add to Cart The item has been added

    Microsoft Unified XDR and SIEM Solution Handbook

    A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solutionKey Features- Learn how to leverage Microsoft's XDR and SIEM for long-term resilience- Explore ways to elevate your security posture using...
    $109.00

    Add to Cart The item has been added
  • Secure Coding Practices Secure Coding Practices
    Add to Cart The item has been added

    Secure Coding Practices

    Secure Coding Practices: Fortifying Applications Against Cyber Threats is a comprehensive guide that explores the importance of secure coding, the fundamentals of cyber threats, common vulnerabilities, best practices in code development, authentication...
    $70.00

    Add to Cart The item has been added
  • Cybersecurity for Everyone Cybersecurity for Everyone
    Add to Cart The item has been added

    Cybersecurity for Everyone

    "Cybersecurity for Everyone" is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks...
    $140.00

    Add to Cart The item has been added
  • Personal Security Data in an Increasingly Digital World Personal Security Data in an Increasingly Digital World
    Add to Cart The item has been added

    Personal Security Data in an Increasingly Digital World

    This collection of essays has been curated with the goal of providing a framework for understanding personal security data in the modern age. A wide range of relevant topics are discussed and analyzed including anonymity, privacy breaches, and biometric...
    $36.00

    Add to Cart The item has been added
  • Measuring Itsm Measuring Itsm
    Add to Cart The item has been added

    Measuring Itsm

    How do you measure and report your IT services and processes? Which metrics matter the most to senior executives?Finally, here is a book that shows you how! Not theory, but a practical guide that shows you the operational metrics to use and how these can...
    $44.00

    Add to Cart The item has been added
  • PCI Compliance PCI Compliance
    Add to Cart The item has been added

    PCI Compliance

    Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous...
    $321.00

    Add to Cart The item has been added
  • Cybersecurity for Industrial Control Systems Cybersecurity for Industrial Control Systems
    Add to Cart The item has been added

    Cybersecurity for Industrial Control Systems

    As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of...
    $214.00

    Add to Cart The item has been added
  • The Bitcoin Memoir The Bitcoin Memoir
    Add to Cart The item has been added

    The Bitcoin Memoir

    ...understanding the blockchain revolution...Learn the story from Bitcoin's perspective!"If you are a Bitcoin beginner or just want to hear my story, this book is a must-read for anyone interested in understanding 'the Internet of Money', providing a...
    $15.00

    Add to Cart The item has been added
  • Surviving Security Surviving Security
    Add to Cart The item has been added

    Surviving Security

    Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and...
    $321.00

    Add to Cart The item has been added
  • A Hacker I Am Vol 2 A Hacker I Am Vol 2
    Add to Cart The item has been added

    A Hacker I Am Vol 2

    This book is the second book in the "A Hacker, I Am" series, it is not your normal cybersecurity book, it's not meant to be read from front to back chapter by chapter, you open it up and pick which chapter piques your interest the most and read that one...
    $66.00

    Add to Cart The item has been added
  • The Birth of Bitcoin The Birth of Bitcoin
    Add to Cart The item has been added

    The Birth of Bitcoin

    Introducing "The Birth of Bitcoin" a fascinating and insightful exploration of the birth of the world's most revolutionary digital currency. From its humble beginnings in 2008, Bitcoin has exploded onto the global stage, challenging traditional financial...
    $24.00

    Add to Cart The item has been added
  • The Legacy of Satoshi Nakamoto The Legacy of Satoshi Nakamoto
    Add to Cart The item has been added

    The Legacy of Satoshi Nakamoto

    Are you curious about the mysterious figure behind the creation of Bitcoin? Do you want to learn about the impact of cryptocurrency on the world, and the future of this revolutionary technology? Look no further than "The Legacy of Satoshi Nakamoto."In...
    $24.00

    Add to Cart The item has been added
  • Shadow Codes Shadow Codes
    Add to Cart The item has been added

    Shadow Codes

    Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Digital Age." Tailored for tech enthusiasts, cybersecurity students, or simply the curious, this book unravels the mysteries of digital spying, making it an...
    $29.00

    Add to Cart The item has been added
  • Kryptologie Kryptologie
    Add to Cart The item has been added

    Kryptologie

    Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft", gewinnt für den Informatiker zusehends praktische Bedeutung in Verbindung mit Datenbanken und Telekommunikation. Neben ihre Nutzung in rechnergestützten öffentlichen...
    $107.00

    Add to Cart The item has been added
  • Handbook of Computer Networks and Cyber Security Handbook of Computer Networks and Cyber Security
    Add to Cart The item has been added

    Handbook of Computer Networks and Cyber Security

    This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various...
    $444.00

    Add to Cart The item has been added
  • Handbook of Multimedia Information Security Handbook of Multimedia Information Security
    Add to Cart The item has been added

    Handbook of Multimedia Information Security

    This handbook is organized under three major parts.  The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral...
    $411.00

    Add to Cart The item has been added
  • Re-Thinking the Human Factor Re-Thinking the Human Factor
    Add to Cart The item has been added

    Re-Thinking the Human Factor

    Confidential data and our personal privacy are under threat as never before. With breaches and cyber attacks on the rise, political and legal pressure is growing on business and government to step up and meet this challenge.Unfortunately, organisations...
    $22.00

    Add to Cart The item has been added
  • MyData and Data Sovereignty in the Age of AI MyData and Data Sovereignty in the Age of AI
    Add to Cart The item has been added

    MyData and Data Sovereignty in the Age of AI

    The era of data sovereignty has arrived and the world is transforming into a data-driven society. This book begins its discussion with ownership of data from a big data and personal data perspective. Innovative services that combine technologies such as...
    $61.00

    Add to Cart The item has been added
  • Happily Ever Cyber! Happily Ever Cyber!
    Add to Cart The item has been added

    Happily Ever Cyber!

    Are your family, your business, and your data safe from cyber threats?Our world has dramatically changed, and we rely on technology for everything we do, but according to recent studies, there is a new victim of identity theft every two seconds. Identity...
    $30.00

    Add to Cart The item has been added
  • Bulletproof TLS and PKI, Second Edition Bulletproof TLS and PKI, Second Edition
    Add to Cart The item has been added

    Bulletproof TLS and PKI, Second Edition

    Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristić, author of the popular SSL Labs web site, this book will teach you everything you need to know to protect...
    $109.00

    Add to Cart The item has been added
  • The Psychology of Information Security The Psychology of Information Security
    Add to Cart The item has been added

    The Psychology of Information Security

    In today's corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company's assets and mitigate risks to the furthest...
    $39.00

    Add to Cart The item has been added
  • NIST Cloud Security NIST Cloud Security
    Add to Cart The item has been added

    NIST Cloud Security

    Introducing the NIST Cloud Security Book Bundle!Are you ready to take your cloud security knowledge to the next level? Look no further than our comprehensive book bundle, NIST Cloud Security: Cyber Threats, Policies, and Best Practices. This bundle...
    $94.00

    Add to Cart The item has been added
  • Python Ethical Hacking from Scratch Python Ethical Hacking from Scratch
    Add to Cart The item has been added

    Python Ethical Hacking from Scratch

    Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey Features:Get hands-on with ethical hacking and learn to think like a...
    $93.00

    Add to Cart The item has been added
  • Building Full Stack DeFi Applications Building Full Stack DeFi Applications
    Add to Cart The item has been added

    Building Full Stack DeFi Applications

    Take your blockchain and Web3 development skills to the next level by building real-world full-stack DeFi applications with Solidity and JavaScriptKey FeaturesGain the knowledge you need to start implementing DeFi principles in practiceLearn how to build...
    $98.00

    Add to Cart The item has been added
  • Securing Cloud Services Securing Cloud Services
    Add to Cart The item has been added

    Securing Cloud Services

    Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud. The...
    $117.00

    Add to Cart The item has been added
  • Practical Mobile Forensics - Second Edition Practical Mobile Forensics - Second Edition
    Add to Cart The item has been added

    Practical Mobile Forensics - Second Edition

    A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platformsKey FeaturesGet to grips with the basics of mobile forensics and the various forensic approachesRetrieve and analyze the data stored on mobile devices and...
    $126.00

    Add to Cart The item has been added
Computer security