Computer security Books

Sidebar Sidebar Sidebar
  • Exploring Security in Software Architecture and Design Exploring Security in Software Architecture and Design
    Add to Cart The item has been added

    Exploring Security in Software Architecture and Design

    Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced...
    $486.00

    Add to Cart The item has been added
  • Security and Privacy in Smart Sensor Networks Security and Privacy in Smart Sensor Networks
    Add to Cart The item has been added

    Security and Privacy in Smart Sensor Networks

    Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures...
    $486.00

    Add to Cart The item has been added
  • Security, Privacy, and Anonymization in Social Networks Security, Privacy, and Anonymization in Social Networks
    Add to Cart The item has been added

    Security, Privacy, and Anonymization in Social Networks

    Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks:...
    $351.00

    Add to Cart The item has been added
  • Privacy and Security Policies in Big Data Privacy and Security Policies in Big Data
    Add to Cart The item has been added

    Privacy and Security Policies in Big Data

    In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security...
    $475.00

    Add to Cart The item has been added
  • Detecting and Mitigating Robotic Cyber Security Risks Detecting and Mitigating Robotic Cyber Security Risks
    Add to Cart The item has been added

    Detecting and Mitigating Robotic Cyber Security Risks

    Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and...
    $475.00

    Add to Cart The item has been added
  • Online Banking Security Measures and Data Protection Online Banking Security Measures and Data Protection
    Add to Cart The item has been added

    Online Banking Security Measures and Data Protection

    Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever...
    $486.00

    Add to Cart The item has been added
  • Security Management in Mobile Cloud Computing Security Management in Mobile Cloud Computing
    Add to Cart The item has been added

    Security Management in Mobile Cloud Computing

    Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing...
    $339.00

    Add to Cart The item has been added
  • Handbook of SCADA/Control Systems Security Handbook of SCADA/Control Systems Security
    Add to Cart The item has been added

    Handbook of SCADA/Control Systems Security

    This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities...
    $392.00

    Add to Cart The item has been added
  • ISPD '18 ISPD '18
    Add to Cart The item has been added

    ISPD '18

    <p>On behalf of the organizing committee, we are delighted to welcome you to the 2018 ACM International Symposium on Physical Design (ISPD), held at Seaside, California. Continuing the great tradition established by its twenty-six predecessors,...
    $100.00

    Add to Cart The item has been added
  • CODASPY '18 CODASPY '18
    Add to Cart The item has been added

    CODASPY '18

    <p>It is our great pleasure to welcome you to the eighth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2018), which follows the successful seven editions held in February/March 2011-2017. This conference series...
    $219.00

    Add to Cart The item has been added
  • Practical Risk Management for the CIO Practical Risk Management for the CIO
    Add to Cart The item has been added

    Practical Risk Management for the CIO

    Detailing procedures that will help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management...
    $149.00

    Add to Cart The item has been added
  • Mastering Cybersecurity Ethics Mastering Cybersecurity Ethics
    Add to Cart The item has been added

    Mastering Cybersecurity Ethics

    Cybersecurity has become a significant concern in a world that is becoming more digitally linked. Technology's explosive growth has given rise to previously unheard-of advantages and opportunities, but it has also made us vulnerable to increasing threats...
    $37.00

    Add to Cart The item has been added
  • Digital Dreams Have Become Nightmares Digital Dreams Have Become Nightmares
    Add to Cart The item has been added

    Digital Dreams Have Become Nightmares

    This book offers a compelling discussion of the digital dreams that have come true, their often unintended side effects (nightmares), and what must be done to counteract the nightmares. It is intended as an impetus to further conversation not only in...
    $109.00

    Add to Cart The item has been added
  • Data Governance Imperative (The) Data Governance Imperative (The)
    Add to Cart The item has been added

    Data Governance Imperative (The)

    Attention to corporate information has never been more important than now. The ability to generate accurate business intelligence, accurate financial reports and to understand your business relies on better processes and personal commitment to clean...
    $88.00

    Add to Cart The item has been added
  • Pentest+ Exam Pass Pentest+ Exam Pass
    Add to Cart The item has been added

    Pentest+ Exam Pass

    ���� Become a Certified Penetration Tester! ����Are you ready to level up your cybersecurity skills and become a certified penetration tester? Look no further! ����Introducing the ultimate resource for cybersecurity professionals: the "PENTEST+ EXAM...
    $92.00

    Add to Cart The item has been added
  • Kali Linux CLI Boss Kali Linux CLI Boss
    Add to Cart The item has been added

    Kali Linux CLI Boss

    ���� Introducing the "Kali Linux CLI Boss" Book Bundle: From Novice to Command Line Maestro ����Are you ready to master the world of cybersecurity and become a true command line expert? Look no further! Dive into the "Kali Linux CLI Boss" book bundle, a...
    $91.00

    Add to Cart The item has been added
  • Crafting Secure Software Crafting Secure Software
    Add to Cart The item has been added

    Crafting Secure Software

    Gain a solid understanding of the threat landscape and discover best practices to protect your software factory throughout the SDLC, with valuable insights from security experts at GitGuardianKey Features:- Develop a strong security posture by grasping...
    $131.00

    Add to Cart The item has been added
  • Endpoint Detection and Response Essentials Endpoint Detection and Response Essentials
    Add to Cart The item has been added

    Endpoint Detection and Response Essentials

    Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategyKey FeaturesLearn how to tackle endpoint security problems in your...
    $89.00

    Add to Cart The item has been added
  • Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
    Add to Cart The item has been added

    Privacy-Preserving Machine Learning

    Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breachesKey Features:- Understand machine learning privacy...
    $94.00

    Add to Cart The item has been added
  • A Non-Techie Beginners' Guide to Cybersecurity and Privacy A Non-Techie Beginners' Guide to Cybersecurity and Privacy
    Add to Cart The item has been added

    A Non-Techie Beginners' Guide to Cybersecurity and Privacy

    If you are worried about falling victim to cyber threats and having your sensitive data compromised, then keep reading...Are you tired of constantly worrying about hackers getting into your personal information and compromising your online privacy?Do you...
    $58.00

    Add to Cart The item has been added
  • Redes de ordenadores y ciberseguridad Redes de ordenadores y ciberseguridad
    Add to Cart The item has been added

    Redes de ordenadores y ciberseguridad

    Dos manuscritos en un libro:Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, Conexiones de Internet, Ciberseguridad y PirateríaCiberseguridad: Una Simple Guía para...
    $49.00

    Add to Cart The item has been added
  • Developing and Securing the Cloud Developing and Securing the Cloud
    Add to Cart The item has been added

    Developing and Securing the Cloud

    Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.Filling...
    $154.00

    Add to Cart The item has been added
  • The Digital Revolution The Digital Revolution
    Add to Cart The item has been added

    The Digital Revolution

    "The Digital Revolution: How Technology is Reshaping Our World" is a compelling and insightful exploration of the profound impact that digital technology has had on every aspect of our lives. From the way we communicate and work to how we learn and play,...
    $61.00

    Add to Cart The item has been added
  • The GPT-4 Crypto Revolution The GPT-4 Crypto Revolution
    Add to Cart The item has been added

    The GPT-4 Crypto Revolution

    Discover the power of AI in the crypto world, from Bitcoin's disruptive emergence to GPT-4's cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your...
    $36.00

    Add to Cart The item has been added
  • Earning Online Earning Online
    Add to Cart The item has been added

    Earning Online

    "Earning Online: From Side Hustle to Full-Time Income" is a comprehensive guide for anyone looking to leverage the power of the internet to create a sustainable and profitable online income stream. Whether you're a freelancer, entrepreneur, or someone...
    $61.00

    Add to Cart The item has been added
Computer security