Computer security books

19718 books were found.

Txting 2 Talking: Disconnect to Reconnect

Txting 2 Talking: Disconnect to Reconnect

Author: Kathryn Hotte
ISBN: 9780228849834
Format: Paperback
$44.85

"In a world where our phones can be used for anything, from checking the weather to finding a drug store, we have...  Read More >>

The Digital Revolution: How Technology is Reshaping Our World

The Digital Revolution: How Technology is Reshaping...

Author: V T Sreekumar
ISBN: 9798224930968
Format: Paperback
$84.48

"""The Digital Revolution: How Technology is Reshaping Our World"" is a compelling and insightful exploration of...  Read More >>

Security Without Obscurity: A Guide to PKI Operations

Security Without Obscurity: A Guide to PKI Operations...

Author: Jeff Stapleton ,  W. Clay Epstein
ISBN: 9781032545226
Format: Hardback
$231.00

Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information...  Read More >>

Earning Online: From Side Hustle to Full-Time Income

Earning Online: From Side Hustle to Full-Time Income...

Author: V T Sreekumar
ISBN: 9798224134694
Format: Paperback
$84.48

"""Earning Online: From Side Hustle to Full-Time Income"" is a comprehensive guide for anyone looking to leverage...  Read More >>

Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage

Enterprise Cyber Risk Management as a Value Creator:...

Author: Bob Chaput
ISBN: 9798868800931
Format: Paperback
$105.57

Beginning-Intermediate user level  Read More >>

Tech Horizons 2024: Navigating the New Frontier of Technology

Tech Horizons 2024: Navigating the New Frontier of Technology...

Author: David Wilson
ISBN: 9798882587443
Format: Paperback
$50.13

The book examines 22 cutting-edge technological trends that will influence the future, such as digital twins and...  Read More >>

Survival Projects for Off-Grid Living: Survivalist's Handbook of DIY Projects for Preparedness and Cyber Threats Awareness

Survival Projects for Off-Grid Living: Survivalist's...

Author: Adolphus Gilbert
ISBN: 9798882598128
Format: Paperback
$52.80

Survivalist's Handbook of DIY Projects for Preparedness and Cyber Threats Awareness. Are you ready for anything?...  Read More >>

Infrastructure Attack Strategies for Ethical Hacking: Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape

Infrastructure Attack Strategies for Ethical Hacking:...

Author: Harpreet Singh
ISBN: 9788196994723
Format: Undefined
$52.67

"Embark on an immersive journey into the world of ethical hacking with ""Infrastructure Attack Strategies for Ethical...  Read More >>

Smart Card Research and Advanced Applications: 22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14–16, 2023, Revised Selected Papers

Smart Card Research and Advanced Applications: 22nd...

Author: Shivam Bhasin ,  Thomas Roche
ISBN: 9783031544088
Format: Paperback
$171.57

This book constitutes the proceedings of the 22nd International Conference on Smart Card Research and Advanced Applications,...  Read More >>

The Business of Cyber: Why You Should Question What Your Security Team Are Telling You

The Business of Cyber: Why You Should Question What...

Author: Peter Fagan
ISBN: 9781032462905
Format: Paperback
$94.99

This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners....  Read More >>

Cybersecurity Risks and Controls: Fundamentals of Organizational Cybersecurity

Cybersecurity Risks and Controls: Fundamentals of Organizational...

Author: Messenger
ISBN: 9781738008889
Format: Hardback
$131.97

"In an era where digital threats loom large, this comprehensive book provides a holistic exploration of the fundamentals,...  Read More >>

Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication

Trojan Exposed: Cyber Defense And Security Protocols...

Author: Rob Botwright
ISBN: 9781839386596
Format: Paperback
$105.47

"Introducing the ""Trojan Exposed"" Book Bundle: Your Ultimate Defense Against Cyber Threats! ����️ Are you concerned...  Read More >>

The GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age

The GPT-4 Crypto Revolution: Pioneering Profit in a...

Author: Zane Wilder
ISBN: 9798224332267
Format: Paperback
$44.85

 Read More >>

Multimedia Watermarking: Latest Developments and Trends

Multimedia Watermarking: Latest Developments and Trends...

Author: Aditya Kumar Sahu
ISBN: 9789819998029
Format: Hardback
$422.37

Multimedia watermarking is a key ingredient for integrity verification, transaction tracking, copyright protection,...  Read More >>

Building Cybersecurity Applications with Blockchain and Smart Contracts

Building Cybersecurity Applications with Blockchain...

Author: Nour El Madhoun ,  Ioanna Dionysiou
ISBN: 9783031507328
Format: Hardback
$422.37

This book offers an in-depth exploration of the application of blockchain and smart contract technologies in the...  Read More >>

Desinformationsangriffe auf Unternehmen abwehren: Das dunkle Geschäft mit Fake News & Co und wie man sie bekämpft

Desinformationsangriffe auf Unternehmen abwehren: Das...

Author: Uwe Wolff
ISBN: 9783658437541
Format: Paperback
$171.57

Spätestens seit den massiven Desinformationsangriffen auf westliche Impfstoffhersteller während der Coronapandemie...  Read More >>

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance

Facial Recognition Technology: Current Capabilities,...

Author: National Academies of Sciences, Engineering, and Medicine ,  Division of Behavioral and Social Sciences and Education
ISBN: 9780309713207
Format: Paperback
$105.60

Facial recognition technology is increasingly used for identity verification and identification, from aiding law...  Read More >>

NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library

NMAP Network Scanning Series: Network Security, Monitoring,...

Author: Rob Botwright
ISBN: 9781839386534
Format: Paperback
$105.47

Unlock the Power of Network Security with the NMAP Network Scanning Series! Welcome to the Network Security, Monitoring,...  Read More >>

Bent Functions and Permutation Methods: Binary and Multiple-Valued Bent Functions

Bent Functions and Permutation Methods: Binary and Multiple-Valued...

Author: Radomir S. Stanković ,  Milena Stanković
ISBN: 9783031506499
Format: Hardback
$145.17

This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing...  Read More >>

Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark

Wireless Exploits And Countermeasures: Kali Linux Nethunter,...

Author: Rob Botwright
ISBN: 9781839386503
Format: Paperback
$105.47

"���� Wireless Exploits and Countermeasures Book Bundle ���� Unveil the Secrets of Wireless Security with Our Comprehensive...  Read More >>

Selected Areas in Cryptography – SAC 2023: 30th International Conference, Fredericton, Canada, August 14–18, 2023, Revised Selected Papers

Selected Areas in Cryptography – SAC 2023: 30th International...

Author: Claude Carlet ,  Kalikinkar Mandal
ISBN: 9783031533679
Format: Paperback
$211.17

This book contains revised selected papers from the 30th International Conference on Selected Areas in Cryptography,...  Read More >>

Debugging Playbook: System Testing, Error Localization, And Vulnerability Remediation

Debugging Playbook: System Testing, Error Localization,...

Author: Rob Botwright
ISBN: 9781839386954
Format: Paperback
$93.40

 Read More >>

Navigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment

Navigating Cybersecurity: Defending Against Cyber Threats:...

Author: Olivia Larson
ISBN: 9798869124821
Format: Paperback
$52.77

"Our lives are now deeply intertwined with the digital world, and technology's power has given us access to unparalleled...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List