Computer security books

23073 books were found.

Practical Public Key Infrastructure (PKI)

Practical Public Key Infrastructure (PKI)

Author: Hani Ezzadeen
ISBN: 9781067565602
Format: Paperback
$40.71

Public key infrastructure (PKI) is a framework that uses public key cryptography to automatically authenticate network...  Read More >>

Gambling Compliance Policies and Procedures: Practical Guide for B2C and B2B VOLUME II

Gambling Compliance Policies and Procedures: Practical...

Author: Powered Vip
ISBN: 9798259481756
Format: Paperback
$65.97

Master the complex world of gambling compliance with this practical and professional guide designed for both B2C...  Read More >>

Seguridad Cibernética Empresarial para Emprendedores y Freelancers: Cómo Proteger los Datos de los Clientes, el Correo Electrónico, los Pagos y Tu Negocio en Línea de las Amenazas Cibernéticas

Seguridad Cibernética Empresarial para Emprendedores...

Author: Joe Correa
ISBN: 9798295862106
Format: Paperback
$52.77

Este libro práctico y fácil de entender te enseñará cómo proteger tus dispositivos, cuentas, correos electrónicos,...  Read More >>

Herramientas y Estrategias Avanzadas de Ciberseguridad: Cifrado, Firewalls, Almacenamiento Seguro en la Nube, Detección de Amenazas y Respuesta a Incidentes para Personas sin Conocimientos Técnicos

Herramientas y Estrategias Avanzadas de Ciberseguridad:...

Author: Joe Correa
ISBN: 9798295862113
Format: Paperback
$52.77

Este libro es ideal para quienes desean tomar control de su privacidad, proteger información sensible y navegar...  Read More >>

Privacidad Digital y Leyes de Ciberseguridad en Todo el Mundo: Comprende Tus Derechos, las Regulaciones de Datos (como el RGPD) y Cómo Mantener el Cumplimiento en Diferentes Países y Fronteras Internacionales

Privacidad Digital y Leyes de Ciberseguridad en Todo...

Author: Joe Correa
ISBN: 9798295862151
Format: Paperback
$52.77

Este libro explica de forma sencilla regulaciones clave como GDPR, CCPA, LGPD y PIPEDA, mostrando cómo afectan a...  Read More >>

Mastering Claude Mythos: An Advanced Guide to AI-Powered Cybersecurity and Autonomous Vulnerability Discovery

Mastering Claude Mythos: An Advanced Guide to AI-Powered...

Author: Kevlin Henney
ISBN: 9798259445796
Format: Paperback
$42.21

Independent Publication. Not affiliated with or endorsed by Anthropic, PBC. The era of reactive cybersecurity is...  Read More >>

Cybersécurité pour Médecins et Professionnels de Santé: Protégez les Données de Vos Patients et Votre Pratique

Cybersécurité pour Médecins et Professionnels de Santé:...

Author: Pamela Boulogne
ISBN: 9798259401105
Format: Paperback
$30.62

Le Serment d'Hippocrate ne s'arrête plus à la porte de votre cabinet. À l'heure du dossier médical partagé et de...  Read More >>

Distributed System Failures: Diagnosing Microservice Instability, Cloud Connectivity Breakdowns, and Data Synchronization Errors in Modern Distributed Architectures

Distributed System Failures: Diagnosing Microservice...

Author: Leonard J Horta
ISBN: 9798259407510
Format: Paperback
$65.95

The code is perfect. The tests passed. So why is the system down? In a distributed world, your software is only...  Read More >>

Python for OSINT Automation: Building Monitoring Tools for Continuous Intelligence Gathering

Python for OSINT Automation: Building Monitoring Tools...

Author: Bradley Fray
ISBN: 9798259205093
Format: Paperback
$79.17

Most Python OSINT books hand you isolated code snippets and call it a system. This book builds the real thing: a...  Read More >>

Cómo Trabajan los Hackers (y Cómo Detenerlos): Estafas Comunes, Phishing, Malware y Tácticas Reales Utilizadas por los Ciberdelincuentes

Cómo Trabajan los Hackers (y Cómo Detenerlos): Estafas...

Author: Joe Correa
ISBN: 9798295858390
Format: Paperback
$52.77

Este libro es una guía práctica y fácil de entender diseñada para ayudarte a navegar el mundo digital con mayor...  Read More >>

Navegación Segura y Seguridad del Correo Electrónico: Cómo Usar Internet Sin Ser Hackeado - Incluye Correo Electrónico Seguro, VPN y Herramientas de Navegación Privada

Navegación Segura y Seguridad del Correo Electrónico:...

Author: Joe Correa
ISBN: 9798295858482
Format: Paperback
$52.77

Este libro práctico y fácil de entender te enseñará cómo navegar por internet de forma segura, proteger tus cuentas,...  Read More >>

The Age of Synthetic Reality: Identity, Trust, and Security in the AI Era

The Age of Synthetic Reality: Identity, Trust, and Security...

Author: Mark Scott-Paton
ISBN: 9798259180987
Format: Paperback
$79.17

We are living through a transformation unlike anything humanity has ever experienced. Artificial Intelligence has...  Read More >>

Post-Quantum Security Engineering: Transitioning from RSA and ECC to Quantum-Safe Cryptography

Post-Quantum Security Engineering: Transitioning from...

Author: Julian Krell
ISBN: 9798259247147
Format: Paperback
$60.72

Most books about cryptography quietly assume you still have time. This one doesn't. We are entering a moment where...  Read More >>

Smart People Get Scammed Too: How AI and Crypto Fraud Are Targeting Retirees - and How to Fight Back

Smart People Get Scammed Too: How AI and Crypto Fraud...

Author: Mary Litschiewski ,  Mike Litschiewski
ISBN: 9798259292932
Format: Paperback
$47.49

A retired engineer. A former realtor. Fifty years of investing experience between them. They still lost $126,000...  Read More >>

Uniden Bc125at Handheld Scanner User Guide: Scan Frequencies, Set Up, and Operate Your Device with Clear Step-by-Step Instructions

Uniden Bc125at Handheld Scanner User Guide: Scan Frequencies,...

Author: Samuel Whitaker
ISBN: 9798259091658
Format: Paperback
$36.93

Struggling to set up your Uniden BC125AT and not sure where to start? Confused by frequencies, channels, or how...  Read More >>

The Telegram Trap

The Telegram Trap

Author: Joe Hayek
ISBN: 9798295840135
Format: Paperback
$65.97

A systematic analysis of how Telegram-based investment fraud is built. The fake investment that have cost victims...  Read More >>

Offensive Security for Modern Automotive Systems: Reverse Engineering, Firmware Attacks, and Hardware-Level Intrusions

Offensive Security for Modern Automotive Systems: Reverse...

Author: Brennan M Locke
ISBN: 9798258951069
Format: Paperback
$76.53

What really happens beneath the surface of a modern vehicle? When you press the ignition button, adjust cruise control,...  Read More >>

Vehicle Penetration Testing Essentials: CAN Bus Exploitation and Embedded System Attacks Explained

Vehicle Penetration Testing Essentials: CAN Bus Exploitation...

Author: Brennan M Locke
ISBN: 9798258979575
Format: Paperback
$76.53

What if your car isn't just a machine-but a network waiting to be explored? What if every signal, every control...  Read More >>

Privacidad y Seguridad en Internet para Principiantes: Pasos Simples para Proteger Tu Identidad, Dispositivos y Datos Personales en Línea

Privacidad y Seguridad en Internet para Principiantes:...

Author: Joe Correa
ISBN: 9798295847769
Format: Paperback
$52.77

Aprenderás cómo proteger tus contraseñas, asegurar tus dispositivos, navegar de forma privada, comunicarte de manera...  Read More >>

Confidentialité en ligne 101: Étapes simples pour protéger votre identité, vos appareils et vos données personnelles en ligne

Confidentialité en ligne 101: Étapes simples pour protéger...

Author: Joe Correa
ISBN: 9798295847783
Format: Paperback
$52.77

Dans un monde où chaque clic, recherche et interaction en ligne laisse une trace, protéger sa vie privée n'est plus...  Read More >>

Verification Before Execution: The Control Layer for High-Impact Systems

Verification Before Execution: The Control Layer for...

Author: Derek Hone
ISBN: 9798258796721
Format: Paperback
$79.17

Most systems execute first-and verify later. That order is wrong. And at scale, it is dangerous. Verification...  Read More >>

Essential Reverse Engineering Handbook: Tools, Techniques, and Methodologies for Analyzing Binaries, Malware, and Software Systems

Essential Reverse Engineering Handbook: Tools, Techniques,...

Author: Keith V Snipes
ISBN: 9798258857552
Format: Paperback
$58.05

What if you could look inside any piece of software and truly understand how it works-line by line, behavior by...  Read More >>

Kali Linux Wi-Fi Hacking: Attaques, Exploitation et Défense dans les Réseaux Wireless avec des Outils de Haute Performance

Kali Linux Wi-Fi Hacking: Attaques, Exploitation et...

Author: Studiod21 Smart Tech Content ,  Diego Rodrigues
ISBN: 9798258871855
Format: Paperback
$55.39

KALI LINUX WI-FI HACKING: Attaques, Exploitation et Défense dans les Réseaux Wireless avec des Outils de Haute Performance...  Read More >>

Epistemic Asymmetries in the Zero-Day Economy: Evaluating PROMETHEUS-0 as a Counter-Market Instrument for Redirecting Latent Vulnerabilities into Coordinated-Disclosure Pipelines

Epistemic Asymmetries in the Zero-Day Economy: Evaluating...

Author: Rickbed Nandi ,  Rickbed Nandi
ISBN: 9798258886521
Format: Paperback
$41.82

The contemporary vulnerability ecosystem is structured by deep epistemic asymmetries amongst defenders, attackers,...  Read More >>

LA BATAILLE MONDIALE DU XXIe SIÈCLE: L'Afrique face au nouvel ordre algorithmique

LA BATAILLE MONDIALE DU XXIe SIÈCLE: L'Afrique face...

Author: Nathalie Kienga
ISBN: 9798258873774
Format: Paperback
$79.20

La guerre du XXIᵉ siècle ne se joue plus dans les airs, sur les mers, ni dans les champs de bataille. Elle se déroule...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List