Online safety and behaviour Books

Sidebar Sidebar Sidebar
  • Advancements in Cybersecurity Advancements in Cybersecurity
    Add to Cart The item has been added

    Advancements in Cybersecurity

    This book offers a comprehensive exploration of cutting-edge research and developments in the field of cybersecurity. It presents a curated collection of chapters that reflect the latest in empirical data approximation, malware recognition, information...
    $410.00

    Add to Cart The item has been added
  • The CISO 3.0 The CISO 3.0
    Add to Cart The item has been added

    The CISO 3.0

    The CISO 3.0 isn't just a book; it's a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, CISOs can no longer rely solely on technical expertise.
    $128.00

    Add to Cart The item has been added
  • Cybersecurity in Knowledge Management Cybersecurity in Knowledge Management
    Add to Cart The item has been added

    Cybersecurity in Knowledge Management

    The book explores the intersection of knowledge management and cybersecurity, offering an examination of strategies, technologies and frameworks necessary to safeguard organizational knowledge systems. By incorporating perspectives from AI, machine...
    $296.00

    Add to Cart The item has been added
  • Cybersecurity of Discrete Event Systems Cybersecurity of Discrete Event Systems
    Add to Cart The item has been added

    Cybersecurity of Discrete Event Systems

    Su's book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the first in the DES community to provide a thorough introduction of smart cyberattacks on supervisory control systems.
    $237.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Security Implementation in Internet of Medical Things

    This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel...
    $118.00

    Add to Cart The item has been added
  • sale
    The Zero Trust Framework The Zero Trust Framework
    Add to Cart The item has been added

    The Zero Trust Framework

    In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it as well, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
    RRP: $81.39
    $51.00

    Add to Cart The item has been added
  • Crypto Millionaires Crypto Millionaires
    Add to Cart The item has been added

    Crypto Millionaires

    The story of Blockchain is not just a tale of mathematical experiments. It's primarily a story of the age-old attempt to record human activities and the value that flows from them. This time, however, the goal is to make it accessible to everyone on...
    $308.00

    Add to Cart The item has been added
  • It's Your Digital Life It's Your Digital Life
    Add to Cart The item has been added

    It's Your Digital Life

    This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete...
    $282.00

    Add to Cart The item has been added
  • Cyber Crime Investigator's Field Guide Cyber Crime Investigator's Field Guide
    Add to Cart The item has been added

    Cyber Crime Investigator's Field Guide

    Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition...
    $154.00

    Add to Cart The item has been added
  • Routledge Companion to Global Cyber-Security Strategy Routledge Companion to Global Cyber-Security Strategy
    Add to Cart The item has been added

    Routledge Companion to Global Cyber-Security Strategy

    This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an...
    $564.00

    Add to Cart The item has been added
  • Burners and Black Markets Burners and Black Markets
    Add to Cart The item has been added

    Burners and Black Markets

    Tired of being spied on? Encrypt yourself and explore a deep web of exotic goods, banned items & secret files, anonymously and free. Instantly. If you want to live the life of a superhacker, spy or CIA agent, be James Bond or Ethan Hunt for a time...
    $45.00

    Add to Cart The item has been added
  • Digital Forensics and Incident Response - Second Edition Digital Forensics and Incident Response - Second Edition
    Add to Cart The item has been added

    Digital Forensics and Incident Response - Second Edition

    Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for...
    $131.00

    Add to Cart The item has been added
  • Modern Cryptography for Cybersecurity Professionals Modern Cryptography for Cybersecurity Professionals
    Add to Cart The item has been added

    Modern Cryptography for Cybersecurity Professionals

    As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at...
    $93.00

    Add to Cart The item has been added
  • Unveiling the NIST Risk Management Framework (RMF) Unveiling the NIST Risk Management Framework (RMF)
    Add to Cart The item has been added

    Unveiling the NIST Risk Management Framework (RMF)

    Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risksKey Features- Implement NIST RMF with step-by-step instructions for effective security operations- Draw insights...
    $67.00

    Add to Cart The item has been added
  • Cybersecurity Career Master Plan Cybersecurity Career Master Plan
    Add to Cart The item has been added

    Cybersecurity Career Master Plan

    Get started with cybersecurity and progress with the help of expert tips to get certified, find a job, and moreKey Features:Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurityExplore expert tips...
    $109.00

    Add to Cart The item has been added
  • Pervasive Information Security and Privacy Developments Pervasive Information Security and Privacy Developments
    Add to Cart The item has been added

    Pervasive Information Security and Privacy Developments

    Privacy and security concerns are at the forefront of research and critical study in the prevalence of information technology. Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical,...
    $407.00

    Add to Cart The item has been added
  • Law, Policy, and Technology Law, Policy, and Technology
    Add to Cart The item has been added

    Law, Policy, and Technology

    In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy, and Technology: Cyberterorrism,...
    $407.00

    Add to Cart The item has been added
  • Applied Cryptography for Cyber Security and Defense Applied Cryptography for Cyber Security and Defense
    Add to Cart The item has been added

    Applied Cryptography for Cyber Security and Defense

    In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber...
    $407.00

    Add to Cart The item has been added
  • Serious Game Design and Development Serious Game Design and Development
    Add to Cart The item has been added

    Serious Game Design and Development

    The increasing use of games in learning has drawn the attention of numerous disciplines within the scientific community now seeking to understand the nature of its effectiveness and guidance for how to best harness its innovative technology power...
    $407.00

    Add to Cart The item has been added
  • Digital Identity and Access Management Digital Identity and Access Management
    Add to Cart The item has been added

    Digital Identity and Access Management

    Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital...
    $441.00

    Add to Cart The item has been added
  • ICT Ethics and Security in the 21st Century ICT Ethics and Security in the 21st Century
    Add to Cart The item has been added

    ICT Ethics and Security in the 21st Century

    The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption of and access to new products, tools, and software. ICT Ethics and Security in the 21st Century: New...
    $407.00

    Add to Cart The item has been added
  • Security and Privacy Assurance in Advancing Technologies Security and Privacy Assurance in Advancing Technologies
    Add to Cart The item has been added

    Security and Privacy Assurance in Advancing Technologies

    Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental...
    $407.00

    Add to Cart The item has been added
  • Actor-Network Theory and Technology Innovation Actor-Network Theory and Technology Innovation
    Add to Cart The item has been added

    Actor-Network Theory and Technology Innovation

    About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn't until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting...
    $407.00

    Add to Cart The item has been added
  • Cyber Security, Cyber Crime and Cyber Forensics Cyber Security, Cyber Crime and Cyber Forensics
    Add to Cart The item has been added

    Cyber Security, Cyber Crime and Cyber Forensics

    Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing,...
    $407.00

    Add to Cart The item has been added
  • Personal Data Privacy and Protection in a Surveillance Era Personal Data Privacy and Protection in a Surveillance Era
    Add to Cart The item has been added

    Personal Data Privacy and Protection in a Surveillance Era

    In recent years, with rapidly advancing technology and a more globalized culture, the importance of privacy has become paramount. The legal protection of privacy against these new technological threats is a major discussion point in Europe as well as in...
    $407.00

    Add to Cart The item has been added
  • ICT Acceptance, Investment and Organization ICT Acceptance, Investment and Organization
    Add to Cart The item has been added

    ICT Acceptance, Investment and Organization

    The Arab world exhibits its own values and beliefs and poses specific challenges that are reflected on its practices of systems development, implementation and management. ICT is at the forefront of those challenges. ICT Acceptance, Investment and...
    $407.00

    Add to Cart The item has been added
  • CODASPY'19 CODASPY'19
    Add to Cart The item has been added

    CODASPY'19

    <p>It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series...
    $230.00

    Add to Cart The item has been added
  • Digital Dummies' Guide to Cyber Safety Digital Dummies' Guide to Cyber Safety
    Add to Cart The item has been added

    Digital Dummies' Guide to Cyber Safety

    "In the Digital Jungle: Navigating Cyber Threats and Safeguarding Your Online World"In a world driven by technology, our lives have seamlessly intertwined with the digital realm. But as we traverse this intricate network of ones and zeros, we often find...
    $22.00

    Add to Cart The item has been added
  • Pentesting APIs Pentesting APIs
    Add to Cart The item has been added

    Pentesting APIs

    Learn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approachKey Features:- Gain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIs- Follow practical advice and...
    $98.00

    Add to Cart The item has been added
  • AWS Security Cookbook - Second Edition AWS Security Cookbook - Second Edition
    Add to Cart The item has been added

    AWS Security Cookbook - Second Edition

    Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, while following cloud security best practicesKey Features:- Explore useful recipes for implementing robust cloud security solutions on...
    $98.00

    Add to Cart The item has been added
  • Hack the Cybersecurity Interview - Second Edition Hack the Cybersecurity Interview - Second Edition
    Add to Cart The item has been added

    Hack the Cybersecurity Interview - Second Edition

    Uncover the secrets to acing interviews, decode the diverse roles in cybersecurity, and soar to new heights with expert adviceKey Features:- Confidently handle technical and soft skill questions across various cybersecurity roles- Prepare for...
    $85.00

    Add to Cart The item has been added
  • Security and Privacy in Smart Sensor Networks Security and Privacy in Smart Sensor Networks
    Add to Cart The item has been added

    Security and Privacy in Smart Sensor Networks

    Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures...
    $486.00

    Add to Cart The item has been added
  • Security, Privacy, and Anonymization in Social Networks Security, Privacy, and Anonymization in Social Networks
    Add to Cart The item has been added

    Security, Privacy, and Anonymization in Social Networks

    Technology has become profoundly integrated into modern society; however, this increases the risk of vulnerabilities, such as hacking and other system errors, along with other online threats. Security, Privacy, and Anonymization in Social Networks:...
    $351.00

    Add to Cart The item has been added
Online safety and behaviour