Computer security books

22988 books were found.

Cybersecurity for Executives: A guide to protecting your organisation, reputation and career

Cybersecurity for Executives: A guide to protecting...

Author: Stuart Jubb
ISBN: 9781781339817
Format: Paperback
$46.55

Cybersecurity for Business Leaders equips leaders to understand cyber risk, make confident decisions and protect...  Read More >>

Black Forest Shadow: A Dark Fantasy Guide to Docker and Kubernetes Security

Black Forest Shadow: A Dark Fantasy Guide to Docker...

Author: Mohammad-Ali A'Râbi
ISBN: 9783982829852
Format: Paperback
$39.57

A dark fantasy set in 1865 Black Forest, where shadows embody real-world container security threats. Each chapter...  Read More >>

Digital Privacy Field Manual: How to Protect Your Identity, Devices, and Data in a Surveillance World

Digital Privacy Field Manual: How to Protect Your Identity,...

Author: David A Rodgers, Jr
ISBN: 9798251817591
Format: Paperback
$33.71

Digital Privacy Field Manual is a practical guide to protecting your identity, devices, and communications in a...  Read More >>

A.I. Proof Ciphers: Cross Shift Method

A.I. Proof Ciphers: Cross Shift Method

Author: Tom Klingenfuss
ISBN: 9798251635546
Format: Paperback
$31.55

A.I. Proof Ciphers: Cross Shift Method demonstrates how to create a cipher that cannot be deciphered by artificial...  Read More >>

Wire Fraud Prevention: A Cybersecurity Playbook for Real Estate: Practical Prevention & Response Guide for Real Estate Professionals 2026 Edition

Wire Fraud Prevention: A Cybersecurity Playbook for...

Author: Lennan Carver
ISBN: 9798251588668
Format: Paperback
$39.57

$2.77 Billion Was Stolen Through Wire Fraud in 2024. Real Estate Was the #1 Target.The average loss per closing:...  Read More >>

Anonymous Internet Guide: A Practical Guide to Online Privacy, Tor, VPNs, Secure Messaging, and Digital Anonymity

Anonymous Internet Guide: A Practical Guide to Online...

Author: David A Rodgers, Jr
ISBN: 9798251448641
Format: Paperback
$38.99

Anonymous Internet Guide A Practical Guide to Online Privacy, Tor, VPNs, Secure Messaging, and Digital Anonymity...  Read More >>

Artificial Intelligence in Cybersecurity: Use AI to Protect Your Organization

Artificial Intelligence in Cybersecurity: Use AI to...

Author: Lisa Ventura
ISBN: 9781398624641
Format: Paperback
$68.95

Develop the skills to stop AI-powered cyberattacks and leverage AI to improve your existing cybersecurity strategies....  Read More >>

Secure IT Systems: 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

Secure IT Systems: 30th Nordic Conference, NordSec 2025,...

Author: Raimundas Matulevičius ,  Liina Kamm
ISBN: 9783032147813
Format: Paperback
$155.22

This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025,...  Read More >>

Das Recht auf informationelle Selbstbestimmung in der Corona-Pandemie: Anforderungen des Vorbehalts des Gesetzes und Bestimmtheitsgebots an Kontaktdatenverarbeitungsregelungen in Rechtsverordnungen

Das Recht auf informationelle Selbstbestimmung in der...

Author: Johanna Sophie Materne
ISBN: 9783658509613
Format: Paperback
$197.97

Die Corona-Pandemie führte in Deutschland zu massiven, mittelbaren Eingriffen in das Recht auf informationelle Selbstbestimmung...  Read More >>

Digital Forensics Cookbook: Field-tested recipes for real-world investigations across Windows, macOS, Linux, iOS, and Android

Digital Forensics Cookbook: Field-tested recipes for...

Author: Cody Bounds
ISBN: 9781805127550
Format: Paperback
$118.77

Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack...  Read More >>

Histories of Computing in Asia: IFIP WG 9.7 International Workshop on the History of Computing, HC 2024, Phuket, Thailand, September 8–9, 2024, Revised Selected Papers

Histories of Computing in Asia: IFIP WG 9.7 International...

Author: Christopher Leslie
ISBN: 9783032194794
Format: Hardback
$336.35

This book constitutes the refereed proceedings of the IFIP WG 9.7 International Workshop on the History of Computing,...  Read More >>

Information Systems: 22nd European, Mediterranean, and Middle Eastern Conference, EMCIS 2025, Paphos, Cyprus, September 11–12, 2025, Proceedings, Part I

Information Systems: 22nd European, Mediterranean, and...

Author: Paulo Rupino da Cunha ,  Marinos Themistocleous
ISBN: 9783032184832
Format: Paperback
$168.16

The two-volume set LNBIP 572 + 573 constitutes selected papers from the 22nd European, Mediterranean, and Middle...  Read More >>

Security Systems Technologies and Innovation: A Comprehensive History of Advances in the Industry

Security Systems Technologies and Innovation: A Comprehensive...

Author: Charles Schnabolk ,  Stefanie Coakes
ISBN: 9780367548988
Format: Hardback
$242.00

Security Systems Technologies and Innovation: A Comprehensive History of Advances looks at the last 50 years and...  Read More >>

Red Team Engineering: The Art of Building Offensive Tools and Infrastructure

Red Team Engineering: The Art of Building Offensive...

Author: Casey Erdmann
ISBN: 9781718504264
Format: Paperback
$180.00

A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration...  Read More >>

Code War: How Nations Hack, Spy, and Shape the Digital Battlefield

Code War: How Nations Hack, Spy, and Shape the Digital...

Author: Allie Mellen
ISBN: 9781394285570
Format: Hardback
$57.95

An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical...  Read More >>

The Book of PF, 4th Edition: A No-Nonsense Guide to the OpenBSD Firewall

The Book of PF, 4th Edition: A No-Nonsense Guide to...

Author: Peter N.M. Hansteen
ISBN: 9781718504707
Format: Paperback
$130.00

 Read More >>

Juggling Formal Methods and Security: Essays Dedicated to Sjouke Mauw on the Occasion of His 65th Birthday

Juggling Formal Methods and Security: Essays Dedicated...

Author: Barbara Fila ,  Hugo Jonker
ISBN: 9783032206831
Format: Paperback
$290.37

 Read More >>

The Gray Zone Playbook: Winning Without War in the 21st Century

The Gray Zone Playbook: Winning Without War in the 21st...

Author: Elvin Karadzi
ISBN: 9789347436987
Format: Paperback
$105.60

Off-the-record sabotage, hidden naval fleets, and targeted cyber intrusions: these escalating assaults remain shadowy...  Read More >>

Blockchain Basics: A Non-Technical Introduction in 25 Steps + 5 Steps Beyond the Basics

Blockchain Basics: A Non-Technical Introduction in 25...

Author: Daniel Drescher
ISBN: 9798868818523
Format: Paperback
$87.09

Demystify Blockchain— Plain Language, Real-World Impact Blockchain is transforming industries, reshaping finance,...  Read More >>

Passive and Active Measurement: 27th International Conference, PAM 2026, Virtual Event, March 23-25, 2026, Proceedings

Passive and Active Measurement: 27th International Conference,...

Author: Simone Ferlin-Reiter ,  Romain Fontugne
ISBN: 9783032182678
Format: Paperback
$219.91

This book constitutes the proceedings of the 27th International Conference on Passive and Active Measurement, PAM...  Read More >>

The AI Cybersecurity Handbook

The AI Cybersecurity Handbook

Author: Caroline Wong
ISBN: 9781394340866
Format: Paperback
$57.95

 Read More >>

Privacy's Defender: My Thirty-Year Fight Against Digital Surveillance

Privacy's Defender: My Thirty-Year Fight Against Digital...

Author: Cindy Cohn
ISBN: 9780262051248
Format: Hardback
$65.00

A personal chronicle of three key legal privacy battles that have defined the digital age and shaped the internet...  Read More >>

CEH Certified Ethical Hacker v13 Study Guide

CEH Certified Ethical Hacker v13 Study Guide

Author: William Panek (Stellacon Training Center, NH, USA)
ISBN: 9781394394289
Format: Paperback
$99.95

Master ethical hacking with the definitive ethical hacking study guide, fully updated with chapter review questions...  Read More >>

Initial Access with Metasploit and Meterpreter: A Hands-On Introduction to Metasploit Techniques

Initial Access with Metasploit and Meterpreter: A Hands-On...

Author: Mike O’Leary
ISBN: 9798868823190
Format: Paperback
$105.57

 Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List