Computer security Books

Sidebar Sidebar Sidebar
  • Introduction to Modern Cryptography Introduction to Modern Cryptography
    Add to Cart The item has been added

    Introduction to Modern Cryptography

    Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of...
    $296.00

    Add to Cart The item has been added
  • The Security Hippie The Security Hippie
    Add to Cart The item has been added

    The Security Hippie

    The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many...
    $282.00

    Add to Cart The item has been added
  • IoT Applications, Security Threats, and Countermeasures IoT Applications, Security Threats, and Countermeasures
    Add to Cart The item has been added

    IoT Applications, Security Threats, and Countermeasures

    The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog...
    $410.00

    Add to Cart The item has been added
  • The Crypto Kid The Crypto Kid
    Add to Cart The item has been added

    The Crypto Kid

    The World is TransformingFax machines. CD players. Digital cameras. All of these "mainstays" that used to be effective a short ten years ago have all spiraled into obsolescence. 15-second video reels are outperforming TV shows. Podcasts recorded in...
    $25.00

    Add to Cart The item has been added
  • Digital transformation with dataverse Digital transformation with dataverse
    Add to Cart The item has been added

    Digital transformation with dataverse

    Microsoft Dataverse for Teams is a low-code data platform built into Microsoft Teams that allows anybody to create and deploy apps, processes, and intelligent chatbots utilizing Power Apps, Power Automate, and Power Virtual Agents (PVA). You will be...
    $73.00

    Add to Cart The item has been added
  • Shue's, CompTIA Security+ Exam SY0-501, Study Supplement Shue's, CompTIA Security+ Exam SY0-501, Study Supplement
    Add to Cart The item has been added

    Shue's, CompTIA Security+ Exam SY0-501, Study Supplement

    It takes more than one source of study material to prepare for the Security+ exam, but who has time to read through two huge study books? This Study Supplement is the perfect companion to your main study material. This Supplement contains the perfect...
    $35.00

    Add to Cart The item has been added
  • Nine Steps to Success - North American edition Nine Steps to Success - North American edition
    Add to Cart The item has been added

    Nine Steps to Success - North American edition

    Step-by-step guidance on a successful ISO 27001 implementation from an industry leaderResilience against cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the...
    $74.00

    Add to Cart The item has been added
  • Active Directory Administration Cookbook - Second Edition Active Directory Administration Cookbook - Second Edition
    Add to Cart The item has been added

    Active Directory Administration Cookbook - Second Edition

    Simplified actionable recipes for managing Active Directory and Azure AD, as well as Azure AD Connect, for administration on-premise and in the cloud with Windows Server 2022Key Features:Expert solutions for name resolution, federation, certificates, and...
    $109.00

    Add to Cart The item has been added
  • The Cybersecurity Maturity Model Certification (CMMC) The Cybersecurity Maturity Model Certification (CMMC)
    Add to Cart The item has been added

    The Cybersecurity Maturity Model Certification (CMMC)

    The United States DoD (Department of Defense) is one of the largest employers in the world, with about 2.87 million employees. It spends more than a year among more than 350,000 contractors and subcontractors throughout its supply chain.Information in...
    $30.00

    Add to Cart The item has been added
  • Digital Forensics and Incident Response Digital Forensics and Incident Response
    Add to Cart The item has been added

    Digital Forensics and Incident Response

    A practical guide to deploying digital forensic techniques in response to cyber security incidentsKey FeaturesLearn incident response fundamentals and create an effective incident response frameworkMaster forensics investigation utilizing digital...
    $103.00

    Add to Cart The item has been added
  • Information Theoretic Security Information Theoretic Security
    Add to Cart The item has been added

    Information Theoretic Security

    Security is one of the most important issues in communications. Security issues arising in communication networks include confidentiality, integrity, authentication and non-repudiation. Attacks on the security of communication networks can be divided...
    $284.00

    Add to Cart The item has been added
  • Fundamentals of Information Theory and Coding Design Fundamentals of Information Theory and Coding Design
    Add to Cart The item has been added

    Fundamentals of Information Theory and Coding Design

    Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students in mathematical abstraction. Even fewer build the essential theoretical framework when presenting...
    $338.00

    Add to Cart The item has been added
  • Enterprise Security Architecture Enterprise Security Architecture
    Add to Cart The item has been added

    Enterprise Security Architecture

    Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it...
    $270.00

    Add to Cart The item has been added
  • Tradecraft Primer Tradecraft Primer
    Add to Cart The item has been added

    Tradecraft Primer

    Tradecraft Primer: A Framework for Aspiring Interrogators is a timely and relevant reference manual for a new generation of professionals as we enter a new era in our nation's interrogation programs. A must-read for anyone thinking of entering the...
    $149.00

    Add to Cart The item has been added
  • Mathematical Foundations of Public Key Cryptography Mathematical Foundations of Public Key Cryptography
    Add to Cart The item has been added

    Mathematical Foundations of Public Key Cryptography

    In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical...
    $203.00

    Add to Cart The item has been added
  • The Next Floor The Next Floor
    Add to Cart The item has been added

    The Next Floor

    This is a story about how 185 residents of a newly commissioned, multi-story Village Apartments in a suburb of Canberra, Australia, constrain both villains and the Covid-19 pandemic from destroying their retirement.The Security Response Committee (SRC)...
    $34.00

    Add to Cart The item has been added
  • Security Management Security Management
    Add to Cart The item has been added

    Security Management

    Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical...
    $244.00

    Add to Cart The item has been added
  • Economics of Information Security and Privacy III Economics of Information Security and Privacy III
    Add to Cart The item has been added

    Economics of Information Security and Privacy III

    The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science...
    $335.00

    Add to Cart The item has been added
  • Handbook of Remote Biometrics Handbook of Remote Biometrics
    Add to Cart The item has been added

    Handbook of Remote Biometrics

    The development of technologies for the identi?cation of individuals has driven the interest and curiosity of many people. Spearheaded and inspired by the Bertillon coding system for the classi?cation of humans based on...
    $226.00

    Add to Cart The item has been added
  • Economics of Information Security and Privacy Economics of Information Security and Privacy
    Add to Cart The item has been added

    Economics of Information Security and Privacy

    and Overview.- The Price of Uncertainty in Security Games.- Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the UndergroundEconomy.- Security Economics and Critical National Infrastructure.- Internet Multi-Homing Problems:...
    $442.00

    Add to Cart The item has been added
  • Security and Dependability for Ambient Intelligence Security and Dependability for Ambient Intelligence
    Add to Cart The item has been added

    Security and Dependability for Ambient Intelligence

    Preface.- Introduction.- Security and Dependability in Ambient Intelligence (AmI).- Security and Dependability Engineering.- The Use of Patterns in Security and Dependability Engineering: An Overview.- The SERENITY vision.- Realising the Vision...
    $292.00

    Add to Cart The item has been added
  • Handbook of Database Security Handbook of Database Security
    Add to Cart The item has been added

    Handbook of Database Security

    Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing...
    $273.00

    Add to Cart The item has been added
  • Power Analysis Attacks Power Analysis Attacks
    Add to Cart The item has been added

    Power Analysis Attacks

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these...
    $154.00

    Add to Cart The item has been added
  • Securing IoT in Industry 4.0 Applications with Blockchain Securing IoT in Industry 4.0 Applications with Blockchain
    Add to Cart The item has been added

    Securing IoT in Industry 4.0 Applications with Blockchain

    The Industry 4.0 revolution is changing the world around us. Artificial intelligence and machine learning, automation and robotics, big data, Internet of Things, augmented reality, virtual reality, and creativity are the tools of Industry 4.0. Improved...
    $324.00

    Add to Cart The item has been added
  • Exploring the Dynamics of Online Messaging Exploring the Dynamics of Online Messaging
    Add to Cart The item has been added

    Exploring the Dynamics of Online Messaging

    "Exploring the Dynamics of Online Messaging" delves into the heart of our interconnected world, unraveling the multifaceted layers of digital communication. From tracing the evolution and growth of online messaging to exploring its profound significance...
    $21.00

    Add to Cart The item has been added
  • Journal of Cyber Security and Mobility 2-2 Journal of Cyber Security and Mobility 2-2
    Add to Cart The item has been added

    Journal of Cyber Security and Mobility 2-2

    Aim: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber...
    $64.00

    Add to Cart The item has been added
  • Sicherheit in vernetzten Systemen Sicherheit in vernetzten Systemen
    Add to Cart The item has been added

    Sicherheit in vernetzten Systemen

    Im Namen der DFN-CERT Services GmbH und des Programm-Komitees präsentieren wir Ihnen den Konferenzband zur 28. DFN-Konferenz "Sicherheit in vernetzten Systemen" in Hamburg. Seit 1994 jährlich stattfindend, hat diese sich mit einer betont technischen und...
    $88.00

    Add to Cart The item has been added
  • Zen oder die Kunst, seine Privatsphäre zu schützen Zen oder die Kunst, seine Privatsphäre zu schützen
    Add to Cart The item has been added

    Zen oder die Kunst, seine Privatsphäre zu schützen

    Privatsphäre? Was ist das? Wozu brauch ich das? Und was bringt mir das überhaupt? Kann ich nicht viel einfacher ohne Privatsphäre leben? In Zeiten in denen wir hin- und hergerissen sind zwischen unserem öffentlichen Leben auf (un)sozialen Medien, der...
    $48.00

    Add to Cart The item has been added
  • Sicherheit in SIP-basierten VoIP-Netzen Sicherheit in SIP-basierten VoIP-Netzen
    Add to Cart The item has been added

    Sicherheit in SIP-basierten VoIP-Netzen

    Masterarbeit aus dem Jahr 2013 im Fachbereich Informatik - IT-Security, Note: 2, Fachhochschule Technikum Wien, Sprache: Deutsch, Abstract: Die Telefonie über das Medium Internet bietet gegenüber der herkömmlichen Telefonie zwei Vorteile: einerseits ist...
    $135.00

    Add to Cart The item has been added
  • Computer Programming for Beginners and Cybersecurity Computer Programming for Beginners and Cybersecurity
    Add to Cart The item has been added

    Computer Programming for Beginners and Cybersecurity

    Enjoy 55% Bookstore Discount Win the trust of your customers with this original cookbookAll the Basic Knowledge a Newcomer Must Have Would you like to start your own business or look for a job with better knowledge in computer programming and data...
    $70.00

    Add to Cart The item has been added
  • Cybersecurity Exposed Cybersecurity Exposed
    Add to Cart The item has been added

    Cybersecurity Exposed

    Mind the gap...between the actual level of cybersecurity and the amount required to protect you.Ever wondered what exactly is going so badly wrong in society that the fastest booming industry in the world is cybercrime?Psychology meets technology as this...
    $19.00

    Add to Cart The item has been added
  • SELinux System Administration. Second Edition SELinux System Administration. Second Edition
    Add to Cart The item has been added

    SELinux System Administration. Second Edition

    Ward off traditional security permissions and effectively secure your Linux systems with SELinuxKey FeaturesLeverage SELinux to improve the secure state of your Linux systemA clear approach to adopting SELinux within your organizationEssential skills and...
    $137.00

    Add to Cart The item has been added
  • Mastering Your Introduction to Cyber Security Mastering Your Introduction to Cyber Security
    Add to Cart The item has been added

    Mastering Your Introduction to Cyber Security

    Cyber-attacks have increased exponentially, making this book essential in areas such as Business Management, Business Continuity and Disaster Recovery, Risk Management, Compliance, and IT. Dr. Michael C. Redmond, PhD takes a complicated subject...
    $36.00

    Add to Cart The item has been added
  • Implementing Cybersecurity Implementing Cybersecurity
    Add to Cart The item has been added

    Implementing Cybersecurity

    The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as...
    $324.00

    Add to Cart The item has been added
Computer security