Add Wish List Add to Cart The item has been added Earning Online "Earning Online: From Side Hustle to Full-Time Income" is a comprehensive guide for anyone looking to leverage the power of the internet to create a sustainable and profitable online income stream. Whether you're a freelancer, entrepreneur, or someone... RRP: $61.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Simplificando la Ciberseguridad A medida que la tecnología impregna cada vez más nuestras vidas, la seguridad digital ha adquirido una importancia vital. "Simplificando la Ciberseguridad" ofrece una introducción accesible a la ciberseguridad dirigida específicamente a quienes se... RRP: $19.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Encrypted Book of Passwords A password journal with a major difference! An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or... RRP: $19.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity - Attack and Defense Strategies - Third Edition Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey Features:Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE... RRP: $85.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Windows Server 2022 Administration Fundamentals - Third Edition Deploy, set up, and deliver network services with Windows Server 2022, along with exploring Microsoft's role-based certificationsKey FeaturesGet started with server installation, performance monitoring, and server maintenanceDevelop the skills necessary... RRP: $175.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Securing Remote Access in Palo Alto Networks Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishingKey Features:Learn the ins and outs of advanced Palo Alto features and troubleshoot any situation with easeBecome well-versed... RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Network Protocols for Security Professionals Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey Features:Exploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database,... RRP: $109.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The EU Data Protection Code of Conduct for Cloud Service Providers The EU Data Protection Code of Conduct for Cloud Service Providers - A guide to complianceFormally founded in 2017, the EU Data Protection Code of Conduct for Cloud Service Providers (otherwise known as the EU Cloud Code of Conduct; the Code) is a... RRP: $30.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Kali Linux An Ethical Hacker's Cookbook RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mobile Forensics - Advanced Investigative Strategies Master powerful strategies to acquire and analyze evidence from real-life scenariosKey Features:A straightforward guide to address the roadblocks face when doing mobile forensicsSimplify mobile forensics using the right mix of methods, techniques, and... RRP: $114.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity ABCs Cybersecurity problems don't always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security... RRP: $54.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Understanding Cryptography The study of the techniques that are utilized to ensure secure communication in the presence of adversaries is known as cryptography. It includes the analysis and construction of the protocols to prevent the public or third parties from reading private... RRP: $254.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybercrime, Cyberterrorism, and Cyberwarfare RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market What will you learn from this book?Why and how the European General Data Protection Regulation (GDPR) impacts the online advertising market, particularly advertisers, publishers and users.How advertisers and publishers leverage users' personal data to... RRP: $50.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Datenschutz beim vernetzten und autonomen Fahren. Welche Rahmenbedingungen können sensible Daten schützen? Autonomes Fahren ist längst keine Zukunftsmusik mehr. Doch wie jeder technologische Fortschritt fordert auch sie einen hohen Preis: Unsere Daten. Beim vernetzten Fahren fallen unzählige Daten an. Wie kann die europäische Gesetzgebung dabei sensible Daten... RRP: $123.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Im Spannungsfeld zwischen informationeller Selbstbestimmung und öffentlicher Sicherheit Sicherheitsbehörden greifen auf die Daten von Bürgern zurück, wenn sie eine konkrete Gefahr vermuten. Doch wo liegen die juristischen Grenzen eines solchen Vorgehens?Julian Müller zeigt, in welcher Weise die Quellen-Telekommunikationsüberwachung und... RRP: $143.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Basiswissen IT Forensik T-Forensik ist ein sehr spannendes und immer wichtiger werdendes Betätigungsfeld.Dieses Buch soll Einsteigern und Interessierten einen Überblick über die Arbeitsweise, Tools und Techniken geben und als Leitfaden und Nachschlagewerk für die ersten... RRP: $90.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Azure Security - Second Edition Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidentsKey Features:Learn how to secure your Azure cloud workloads across applications and networksProtect your Azure infrastructure from cyber... RRP: $103.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added iOS Forensics for Investigators Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey Features:Explore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts,... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hack the Cybersecurity Interview Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for... RRP: $153.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Policy Design in the Age of Digital Adoption A proven methodology to build a PolicyOps function and public policy design frameworks for digital adoption, supporting your organization's journey into new paradigms and service models such as Cloud, SaaS, CaaS, FaaS, and DevOpsKey Features:Understand... RRP: $131.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Operationalizing Threat Intelligence Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey Features:Develop and implement a threat intelligence program from scratchDiscover techniques to perform cyber threat intelligence,... RRP: $98.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added CompTIA Security+ Learn IT security essentials and prepare for the Security+ exam with this CompTIA exam guide, complete with additional online resources-including flashcards, PBQs, and mock exams-at securityplus.trainingPurchase of the print or Kindle book includes a... RRP: $71.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Mastering Defensive Security An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurityKey Features:Get hold of the best defensive security strategies and... RRP: $114.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Alissa and Her Clever Dog "Cyber" This children's book is about a dog named Cyber who alerts his owners, Alissa and Aubrey, after seeing two boys acting suspicious at a dumpster. Alissa decides to call Kids Cyber Response Team in order to find out what the two boys are up to and how she... RRP: $27.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer and Information Security This comprehensive book provides a global overview of computer and information security. It offers an in-depth analysis of theories, technology and applications of this field. This book focuses on the emerging topic of security informatics. It brings... RRP: $229.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Security in Business and Management The security of digital databases has become increasingly important in the context of modern business set-ups today. There has been a lot of emphasis on innovating and improving cyber security systems for preventing theft or hacking of vital information... RRP: $222.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Accountability in Computing Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control Mechanisms, are preventive in nature. That is, they stop unauthorized parties before they are able to access data, information and services or... RRP: $156.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Robotics and Automation Solutions for Inspection and Maintenance in Critical Infrastructures Infrastructures are ageing and have become a subject of profound concern, awakening our collective consciousness to the imperatives of civil and structural integrity. This concern, compounded by the unrelenting impact of climate change and the burgeoning... RRP: $266.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A History of Cyber Security Attacks Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For... RRP: $160.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Guns and Crime Guns and Crime: The Data Don't Lie investigates the ways in which the current data on guns and crime are inadequate and inaccurate. Although the majority of murders in the United States are committed with guns, research on gun ownership, the supply of... RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Crime & Warfare In Cyber Crime: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage and cyber warfare now pose a major threat to society. After analysing... RRP: $44.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Concepts and Case Studies in Threat Management Professionalization has come to the field of threat management. It has developed a systematic theory unique to the field, recognized authorities have emerged, and it is finding its own ethical code of conduct. It is also beginning to grow its own... RRP: $231.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added PRAGMATIC Security Metrics Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate... RRP: $333.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Managing Risk and Security in Outsourcing IT Services With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information,... RRP: $160.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Noiseless Steganography Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively... RRP: $325.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Soft Target Hardening The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft... RRP: $564.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity and Privacy in Cyber Physical Systems Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Management Handbook, Volume 6 Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools... RRP: $134.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Targeted Violence Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics... RRP: $193.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Understanding the New European Data Protection Rules Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for... RRP: $321.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Case Studies in Secure Computing In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through... RRP: $145.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Case Studies in Intelligent Computing Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing:... RRP: $145.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Exploring Blockchain in Healthcare This book aims to analyze the role of blockchain technology in healthcare and how medical tech teams can establish a digital and linked healthcare system for the modern-day. After reading this book, readers will be able to create, develop, and implement... RRP: $73.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added A Comprehensive Guide to Investing in Cryptocurrency A cryptocurrency is a form of payment that can be exchanged online. Cryptocurrencies work using a technology called a blockchain.It is a collection of binary data which is designed to work as a medium of exchange wherein individual coin ownership records... RRP: $44.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added GDPR and Cyber Security for Business Information Systems The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals... RRP: $160.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Nichts ist sicher Das Internet ist längst kein sicherer Ort mehr. Wo zig Millionen Euros täglich den Besitzer wechseln, sind auch Betrüger, Diebe und andere Kriminelle nicht weit...Wir erläutern in diesem Buch wieviel bzw. wie wenig technisches Know-How es braucht um an... RRP: $58.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Hidden Corporation If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information... RRP: $41.00 Add to Cart The item has been added