Computer security Books

Sidebar Sidebar Sidebar
  • Earning Online Earning Online
    Add to Cart The item has been added

    Earning Online

    "Earning Online: From Side Hustle to Full-Time Income" is a comprehensive guide for anyone looking to leverage the power of the internet to create a sustainable and profitable online income stream. Whether you're a freelancer, entrepreneur, or someone...
    $61.00

    Add to Cart The item has been added
  • Simplificando la Ciberseguridad Simplificando la Ciberseguridad
    Add to Cart The item has been added

    Simplificando la Ciberseguridad

    A medida que la tecnología impregna cada vez más nuestras vidas, la seguridad digital ha adquirido una importancia vital. "Simplificando la Ciberseguridad" ofrece una introducción accesible a la ciberseguridad dirigida específicamente a quienes se...
    $19.00

    Add to Cart The item has been added
  • The Encrypted Book of Passwords The Encrypted Book of Passwords
    Add to Cart The item has been added

    The Encrypted Book of Passwords

    A password journal with a major difference! An alphabetized storage solution for over 500 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or...
    $19.00

    Add to Cart The item has been added
  • Securing Remote Access in Palo Alto Networks Securing Remote Access in Palo Alto Networks
    Add to Cart The item has been added

    Securing Remote Access in Palo Alto Networks

    Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishingKey Features:Learn the ins and outs of advanced Palo Alto features and troubleshoot any situation with easeBecome well-versed...
    $103.00

    Add to Cart The item has been added
  • Network Protocols for Security Professionals Network Protocols for Security Professionals
    Add to Cart The item has been added

    Network Protocols for Security Professionals

    Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey Features:Exploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database,...
    $109.00

    Add to Cart The item has been added
  • Mobile Forensics - Advanced Investigative Strategies Mobile Forensics - Advanced Investigative Strategies
    Add to Cart The item has been added

    Mobile Forensics - Advanced Investigative Strategies

    Master powerful strategies to acquire and analyze evidence from real-life scenariosKey Features:A straightforward guide to address the roadblocks face when doing mobile forensicsSimplify mobile forensics using the right mix of methods, techniques, and...
    $114.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Cybersecurity ABCs

    Cybersecurity problems don't always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security...
    $54.00

    Add to Cart The item has been added
  • Understanding Cryptography Understanding Cryptography
    Add to Cart The item has been added

    Understanding Cryptography

    The study of the techniques that are utilized to ensure secure communication in the presence of adversaries is known as cryptography. It includes the analysis and construction of the protocols to prevent the public or third parties from reading private...
    $254.00

    Add to Cart The item has been added
  • Basiswissen IT Forensik Basiswissen IT Forensik
    Add to Cart The item has been added

    Basiswissen IT Forensik

    T-Forensik ist ein sehr spannendes und immer wichtiger werdendes Betätigungsfeld.Dieses Buch soll Einsteigern und Interessierten einen Überblick über die Arbeitsweise, Tools und Techniken geben und als Leitfaden und Nachschlagewerk für die ersten...
    $90.00

    Add to Cart The item has been added
  • Mastering Azure Security - Second Edition Mastering Azure Security - Second Edition
    Add to Cart The item has been added

    Mastering Azure Security - Second Edition

    Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidentsKey Features:Learn how to secure your Azure cloud workloads across applications and networksProtect your Azure infrastructure from cyber...
    $103.00

    Add to Cart The item has been added
  • iOS Forensics for Investigators iOS Forensics for Investigators
    Add to Cart The item has been added

    iOS Forensics for Investigators

    Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey Features:Explore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts,...
    $98.00

    Add to Cart The item has been added
  • Hack the Cybersecurity Interview Hack the Cybersecurity Interview
    Add to Cart The item has been added

    Hack the Cybersecurity Interview

    Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for...
    $153.00

    Add to Cart The item has been added
  • Policy Design in the Age of Digital Adoption Policy Design in the Age of Digital Adoption
    Add to Cart The item has been added

    Policy Design in the Age of Digital Adoption

    A proven methodology to build a PolicyOps function and public policy design frameworks for digital adoption, supporting your organization's journey into new paradigms and service models such as Cloud, SaaS, CaaS, FaaS, and DevOpsKey Features:Understand...
    $131.00

    Add to Cart The item has been added
  • Operationalizing Threat Intelligence Operationalizing Threat Intelligence
    Add to Cart The item has been added

    Operationalizing Threat Intelligence

    Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey Features:Develop and implement a threat intelligence program from scratchDiscover techniques to perform cyber threat intelligence,...
    $98.00

    Add to Cart The item has been added
  • CompTIA Security+ CompTIA Security+
    Add to Cart The item has been added

    CompTIA Security+

    Learn IT security essentials and prepare for the Security+ exam with this CompTIA exam guide, complete with additional online resources-including flashcards, PBQs, and mock exams-at securityplus.trainingPurchase of the print or Kindle book includes a...
    $71.00

    Add to Cart The item has been added
  • Mastering Defensive Security Mastering Defensive Security
    Add to Cart The item has been added

    Mastering Defensive Security

    An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurityKey Features:Get hold of the best defensive security strategies and...
    $114.00

    Add to Cart The item has been added
  • Alissa and Her Clever Dog "Cyber" Alissa and Her Clever Dog "Cyber"
    Add to Cart The item has been added

    Alissa and Her Clever Dog "Cyber"

    This children's book is about a dog named Cyber who alerts his owners, Alissa and Aubrey, after seeing two boys acting suspicious at a dumpster. Alissa decides to call Kids Cyber Response Team in order to find out what the two boys are up to and how she...
    $27.00

    Add to Cart The item has been added
  • Computer and Information Security Computer and Information Security
    Add to Cart The item has been added

    Computer and Information Security

    This comprehensive book provides a global overview of computer and information security. It offers an in-depth analysis of theories, technology and applications of this field. This book focuses on the emerging topic of security informatics. It brings...
    $229.00

    Add to Cart The item has been added
  • Cyber Security in Business and Management Cyber Security in Business and Management
    Add to Cart The item has been added

    Cyber Security in Business and Management

    The security of digital databases has become increasingly important in the context of modern business set-ups today. There has been a lot of emphasis on innovating and improving cyber security systems for preventing theft or hacking of vital information...
    $222.00

    Add to Cart The item has been added
  • Accountability in Computing Accountability in Computing
    Add to Cart The item has been added

    Accountability in Computing

    Modern day security technologies, such as passwords, authentication protocols, firewalls, and access-control Mechanisms, are preventive in nature. That is, they stop unauthorized parties before they are able to access data, information and services or...
    $156.00

    Add to Cart The item has been added
  • A History of Cyber Security Attacks A History of Cyber Security Attacks
    Add to Cart The item has been added

    A History of Cyber Security Attacks

    Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For...
    $160.00

    Add to Cart The item has been added
  • Guns and Crime Guns and Crime
    Add to Cart The item has been added

    Guns and Crime

    Guns and Crime: The Data Don't Lie investigates the ways in which the current data on guns and crime are inadequate and inaccurate. Although the majority of murders in the United States are committed with guns, research on gun ownership, the supply of...
    $373.00

    Add to Cart The item has been added
  • Cyber Crime & Warfare Cyber Crime & Warfare
    Add to Cart The item has been added

    Cyber Crime & Warfare

    In Cyber Crime: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage and cyber warfare now pose a major threat to society. After analysing...
    $44.00

    Add to Cart The item has been added
  • Concepts and Case Studies in Threat Management Concepts and Case Studies in Threat Management
    Add to Cart The item has been added

    Concepts and Case Studies in Threat Management

    Professionalization has come to the field of threat management. It has developed a systematic theory unique to the field, recognized authorities have emerged, and it is finding its own ethical code of conduct. It is also beginning to grow its own...
    $231.00

    Add to Cart The item has been added
  • PRAGMATIC Security Metrics PRAGMATIC Security Metrics
    Add to Cart The item has been added

    PRAGMATIC Security Metrics

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate...
    $333.00

    Add to Cart The item has been added
  • Managing Risk and Security in Outsourcing IT Services Managing Risk and Security in Outsourcing IT Services
    Add to Cart The item has been added

    Managing Risk and Security in Outsourcing IT Services

    With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information,...
    $160.00

    Add to Cart The item has been added
  • Noiseless Steganography Noiseless Steganography
    Add to Cart The item has been added

    Noiseless Steganography

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively...
    $325.00

    Add to Cart The item has been added
  • Soft Target Hardening Soft Target Hardening
    Add to Cart The item has been added

    Soft Target Hardening

    The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft...
    $564.00

    Add to Cart The item has been added
  • Cybersecurity and Privacy in Cyber Physical Systems Cybersecurity and Privacy in Cyber Physical Systems
    Add to Cart The item has been added

    Cybersecurity and Privacy in Cyber Physical Systems

    Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions...
    $308.00

    Add to Cart The item has been added
  • Information Security Management Handbook, Volume 6 Information Security Management Handbook, Volume 6
    Add to Cart The item has been added

    Information Security Management Handbook, Volume 6

    Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools...
    $134.00

    Add to Cart The item has been added
  • Targeted Violence Targeted Violence
    Add to Cart The item has been added

    Targeted Violence

    Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics...
    $193.00

    Add to Cart The item has been added
  • Understanding the New European Data Protection Rules Understanding the New European Data Protection Rules
    Add to Cart The item has been added

    Understanding the New European Data Protection Rules

    Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for...
    $321.00

    Add to Cart The item has been added
  • Case Studies in Secure Computing Case Studies in Secure Computing
    Add to Cart The item has been added

    Case Studies in Secure Computing

    In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through...
    $145.00

    Add to Cart The item has been added
  • Case Studies in Intelligent Computing Case Studies in Intelligent Computing
    Add to Cart The item has been added

    Case Studies in Intelligent Computing

    Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing:...
    $145.00

    Add to Cart The item has been added
  • Exploring Blockchain in Healthcare Exploring Blockchain in Healthcare
    Add to Cart The item has been added

    Exploring Blockchain in Healthcare

    This book aims to analyze the role of blockchain technology in healthcare and how medical tech teams can establish a digital and linked healthcare system for the modern-day. After reading this book, readers will be able to create, develop, and implement...
    $73.00

    Add to Cart The item has been added
  • A Comprehensive Guide to Investing in Cryptocurrency A Comprehensive Guide to Investing in Cryptocurrency
    Add to Cart The item has been added

    A Comprehensive Guide to Investing in Cryptocurrency

    A cryptocurrency is a form of payment that can be exchanged online. Cryptocurrencies work using a technology called a blockchain.It is a collection of binary data which is designed to work as a medium of exchange wherein individual coin ownership records...
    $44.00

    Add to Cart The item has been added
  • GDPR and Cyber Security for Business Information Systems GDPR and Cyber Security for Business Information Systems
    Add to Cart The item has been added

    GDPR and Cyber Security for Business Information Systems

    The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals...
    $160.00

    Add to Cart The item has been added
  • Nichts ist sicher Nichts ist sicher
    Add to Cart The item has been added

    Nichts ist sicher

    Das Internet ist längst kein sicherer Ort mehr. Wo zig Millionen Euros täglich den Besitzer wechseln, sind auch Betrüger, Diebe und andere Kriminelle nicht weit...Wir erläutern in diesem Buch wieviel bzw. wie wenig technisches Know-How es braucht um an...
    $58.00

    Add to Cart The item has been added
  • The Hidden Corporation The Hidden Corporation
    Add to Cart The item has been added

    The Hidden Corporation

    If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information...
    $41.00

    Add to Cart The item has been added
Computer security