Free Delivery Over $100
652 books were found.
Mind the gap...between the actual level of cybersecurity and the amount required to protect you. Ever wondered... Read More >>
This book is a practical handbook of research on dealing with mathematical methods in crime prevention for special... Read More >>
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing... Read More >>
By providing insight on key advances and future directions for proactivity theory, research, and practice, this... Read More >>
Read More >>
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such... Read More >>
Computer crime refers to criminal activity involving a computer. The computer may be used in the commission of a... Read More >>
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding... Read More >>
This book is a multi-disciplinary analysis of cyber warfare (inter-state cyber aggression), featuring contributions... Read More >>
in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management... Read More >>
Fully up-to-date coverage of every topic on the CEH v9 certification exam Read More >>
Highlights emerging perspectives and critical insights into the preservation of personal data and the complications... Read More >>
This book examines the practices of cybercriminals who steal and sell personal information acquired through various... Read More >>
Charlie Mitchell reveals the innovative and too-often hapless government and industry responses to growing cybersecurity... Read More >>
Game Hacking shows programmers how to dissect computer games and create bots. Read More >>
This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting... Read More >>
From Bletchley Park to cyber-attacks in the twenty-first century, this is the untold story of computers and spies:... Read More >>
This book is designed to provide guidance on the basic cybersecurity practices we can apply at home or in small... Read More >>
Board-level executives are known as 'whales' amongst hackers. That's because they're the big fish who hold the keys... Read More >>
In Book One we learned how Jim Baines, CEO of a major US packaging company, made a simple mistake and discovered... Read More >>