Online safety and behaviour Books

Sidebar Sidebar Sidebar
  • Bug Bounty from Scratch Bug Bounty from Scratch
    Add to Cart The item has been added

    Bug Bounty from Scratch

    Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key Features- Prepare to participate in a bug bounty program- Discover your first bug and claim your reward upon successful detection- Go through...
    $89.00

    Add to Cart The item has been added
  • Smart Boundaries Smart Boundaries
    Add to Cart The item has been added

    Smart Boundaries

    Shaping a World of Respect: Guarding the Innocence of YouthEmbark on a transformative journey with "Smart Boundaries: Safe Children - A Parent's Handbook", your essential guide to cultivating an environment where innocence thrives and awareness grows...
    $29.00

    Add to Cart The item has been added
  • Scam! Scam!
    Add to Cart The item has been added

    Scam!

    Does this sound familiar?"This call is to inform you about an arrest warrant filed under your name. Please call us back at XXX-XXX-XXXX immediately to resolve this legal matter."If you receive a voicemail like this, your first instinct might be to call...
    $26.00

    Add to Cart The item has been added
  • Security Analytics Security Analytics
    Add to Cart The item has been added

    Security Analytics

    This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the...
    $118.00

    Add to Cart The item has been added
  • Future Connected Technologies Future Connected Technologies
    Add to Cart The item has been added

    Future Connected Technologies

    This book summarizes the progress in the research and provides step by step guide towards every aspect of cloud and other connected technologies. The book also covers the security aspects in the field of Cloud computing, Fog/Edge computing, IoT, etc.
    $149.00

    Add to Cart The item has been added
  • Introduction to the Cyber Ranges
    Add to Cart The item has been added

    Introduction to the Cyber Ranges

    With the rising cybercrimes, a well-trained cybersecurity workforce in an organization has become a necessity. This book aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing...
    $116.00

    Add to Cart The item has been added
  • Advances in Cyber Security and Intelligent Analytics Advances in Cyber Security and Intelligent Analytics
    Add to Cart The item has been added

    Advances in Cyber Security and Intelligent Analytics

    The book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. It presents a detailed study on security issues in distributed computing environments and their possible solutions,...
    $113.00

    Add to Cart The item has been added
  • Parent Handbook for Online Safety Parent Handbook for Online Safety
    Add to Cart The item has been added

    Parent Handbook for Online Safety

    Internet safety should be like driving. We should teach it before we provide the keys to the car, and we should help guide our children into the right and wrong decisions of "the road." Tech safety doesn't have to feel overwhelming to parents! This...
    $18.00

    Add to Cart The item has been added
  • Dawn of Distrust Dawn of Distrust
    Add to Cart The item has been added

    Dawn of Distrust

    In "Dawn of Distrust: Technological Threads Weaving a Trustless Society," embark on a riveting exploration into a future where trust is a relic of the past and transparency reigns supreme. Delve into the intricacies of a society transformed by...
    $27.00

    Add to Cart The item has been added
  • IT Audit Field Manual IT Audit Field Manual
    Add to Cart The item has been added

    IT Audit Field Manual

    Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manualKey Features:- Secure and audit endpoints in Windows environments for robust defense- Gain practical skills in...
    $89.00

    Add to Cart The item has been added
  • Shadow Codes Shadow Codes
    Add to Cart The item has been added

    Shadow Codes

    Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Digital Age." Tailored for tech enthusiasts, cybersecurity students, or simply the curious, this book unravels the mysteries of digital spying, making it an...
    $29.00

    Add to Cart The item has been added
  • Happily Ever Cyber! Happily Ever Cyber!
    Add to Cart The item has been added

    Happily Ever Cyber!

    Are your family, your business, and your data safe from cyber threats?Our world has dramatically changed, and we rely on technology for everything we do, but according to recent studies, there is a new victim of identity theft every two seconds. Identity...
    $30.00

    Add to Cart The item has been added
  • Python Ethical Hacking from Scratch Python Ethical Hacking from Scratch
    Add to Cart The item has been added

    Python Ethical Hacking from Scratch

    Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey Features:Get hands-on with ethical hacking and learn to think like a...
    $93.00

    Add to Cart The item has been added
  • Access and Control in Digital Humanities Access and Control in Digital Humanities
    Add to Cart The item has been added

    Access and Control in Digital Humanities

    Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful...
    $373.00

    Add to Cart The item has been added
  • Txting 2 Talking Txting 2 Talking
    Add to Cart The item has been added

    Txting 2 Talking

    In a world where our phones can be used for anything, from checking the weather to finding a drug store, we have found ourselves no longer able to live without our device. It is not more than centimetres, even millimetres, from us at all times. It is our...
    $44.00

    Add to Cart The item has been added
  • EU-Datenschutz-Grundverordnung EU-Datenschutz-Grundverordnung
    Add to Cart The item has been added

    EU-Datenschutz-Grundverordnung

    Dieses Buch enthält neben der EU-Datenschutz-Grundverordnung auch die neue Datenschutzrichtlinie für die Strafverfolgung. Die amtlichen Begründungen sind ebenso abgedruckt. In dieser Textausgabe wurden die Erwägungsgründe ihren Rechtsvorschriften...
    $55.00

    Add to Cart The item has been added
  • The Language of Cybersecurity The Language of Cybersecurity
    Add to Cart The item has been added

    The Language of Cybersecurity

    The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists. Anyone who uses any kind of computing device needs to understand the importance of cybersecurity,...
    $49.00

    Add to Cart The item has been added
  • CYBERSECURITY FOR BEGINNERS CYBERSECURITY FOR BEGINNERS
    Add to Cart The item has been added

    CYBERSECURITY FOR BEGINNERS

    Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?Do you want to know what tools and techniques are used in Cybersecurity?Do you want to know what daily tasks you must do to protect your Infrastructure?If the answer is...
    $47.00

    Add to Cart The item has been added
  • Ethical Password Cracking Ethical Password Cracking
    Add to Cart The item has been added

    Ethical Password Cracking

    Investigate how password protection works and delve into popular cracking techniques for penetration testing and retrieving dataKey Features:- Gain guidance for setting up a diverse password-cracking environment across multiple platforms- Explore tools...
    $85.00

    Add to Cart The item has been added
  • Cybersecurity Primer Cybersecurity Primer
    Add to Cart The item has been added

    Cybersecurity Primer

    Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities.Today, Information Technology products and services face insidious threats from advanced malware that, if left unchecked, are...
    $35.00

    Add to Cart The item has been added
  • Managing Cyber Risk in the Financial Sector Managing Cyber Risk in the Financial Sector
    Add to Cart The item has been added

    Managing Cyber Risk in the Financial Sector

    Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation,...
    $398.00

    Add to Cart The item has been added
  • Cyber Enigma Cyber Enigma
    Add to Cart The item has been added

    Cyber Enigma

    The book analyzes the issues related to cyber technology. It presents the existing reality of cyber environment in India and delves into detailed analysis of issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of US and...
    $105.00

    Add to Cart The item has been added
  • Raising Humans in a Digital World Raising Humans in a Digital World
    Add to Cart The item has been added

    Raising Humans in a Digital World

    Digital literacy advocate Diana Graber demystifies the complicated digital landscape facing today's kids and provides answers for parents and teachers eager to show them how to use technology as an empowering force in their lives and in their role as...
    $36.00

    Add to Cart The item has been added
  • Schnelleinstieg in die Informationssicherheit Schnelleinstieg in die Informationssicherheit
    Add to Cart The item has been added

    Schnelleinstieg in die Informationssicherheit

    Informationssicherheit ist aktueller denn je. Gerade die Angriffe der jüngsten Zeit auf die Informationssicherheit der Unternehmen und Organisationen zeigen die Notwendigkeit eines intakten Informationssicherheitssystems.Mit dem aktualisierten Stand 2021...
    $76.00

    Add to Cart The item has been added
  • Infosec Strategies and Best Practices Infosec Strategies and Best Practices
    Add to Cart The item has been added

    Infosec Strategies and Best Practices

    Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey Features:Convert the theory of your security certifications into actionable changes to secure your organizationDiscover how...
    $93.00

    Add to Cart The item has been added
  • The Cyber Path The Cyber Path
    Add to Cart The item has been added

    The Cyber Path

    Journeying the cyber path is not a walk in the park. Rather, it is an Odyssean experience. For Odysseus, it took ten years on his journey back to Ithaca filled with hazardous events. When traversing the numerous cyber paths between source and...
    $34.00

    Add to Cart The item has been added
  • ASIACCS '18 ASIACCS '18
    Add to Cart The item has been added

    ASIACCS '18

    <p>We are pleased to present herein the proceedings of the 13th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2018) held in Incheon, Korea, June 4-8, 2018.</p> <p>ASIACCS 2018 is organized by AsiaCCS 2018...
    $474.00

    Add to Cart The item has been added
  • Online File Sharing Online File Sharing
    Add to Cart The item has been added

    Online File Sharing

    It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading,...
    $244.00

    Add to Cart The item has been added
  • Secure Edge Computing Secure Edge Computing
    Add to Cart The item has been added

    Secure Edge Computing

    The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge...
    $257.00

    Add to Cart The item has been added
  • The Invisibility Toolkit The Invisibility Toolkit
    Add to Cart The item has been added

    The Invisibility Toolkit

    First, The Bad NewsYour sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Big Brother is alive and well and wants to eat your freedom as if you were Neo in The Matrix! The...
    $35.00

    Add to Cart The item has been added
  • Developing Safer Online Environments for Children Developing Safer Online Environments for Children
    Add to Cart The item has been added

    Developing Safer Online Environments for Children

    As the digital world assumes an ever-increasing role in the daily lives of the public, opportunities to engage in crimes increase as well. The prevention of cyber aggression is an ongoing challenge due to its multifaceted nature and the difficulties in...
    $543.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    PAM Mastery

    Pluggable Authentication Modules: Threat or Menace?PAM is one of the most misunderstood parts of systems administration. Many sysadmins live with authentication problems rather than risk making them worse. PAM’s very nature makes it unlike any...
    $70.00

    Add to Cart The item has been added
  • Cyber Security Threats and Challenges Facing Human Life Cyber Security Threats and Challenges Facing Human Life
    Add to Cart The item has been added

    Cyber Security Threats and Challenges Facing Human Life

    Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The...
    $257.00

    Add to Cart The item has been added
Online safety and behaviour