Computer security books

20683 books were found.

The Complete Guide to Defense in Depth: Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach

The Complete Guide to Defense in Depth: Learn to identify,...

Author: Akash Mukherjee ,  Jason D. Clinton
ISBN: 9781835468265
Format: Paperback
$105.57

Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilient security posture...  Read More >>

The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices

The Comprehensive Guide to Cybersecurity Hiring: Strategies,...

Author: Jason Edwards
ISBN: 9781604272031
Format: Paperback
$131.87

Provides professionals, hiring managers, and business leaders with essential strategies and insights to navigate...  Read More >>

The Comprehensive Guide to Cybersecurity Careers: A Professional's Roadmap for the Digital Security Age

The Comprehensive Guide to Cybersecurity Careers: A...

Author: Jason Edwards
ISBN: 9781604272024
Format: Paperback
$131.87

The definitive resource for aspiring and established cybersecurity professionals. This guide delves deep into the...  Read More >>

Securing Networks Through Penetration Testing: A Practical Guide

Securing Networks Through Penetration Testing: A Practical...

Author: Yakov Palatnik
ISBN: 9798334628205
Format: Paperback
$131.97

Securing Networks Through Penetration Testing: A Practical Guide by Yakov Palatnik is an essential resource for...  Read More >>

Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II

Applied Cryptography and Network Security Workshops:...

Author: Martin Andreoni
ISBN: 9783031614880
Format: Paperback
$171.57

 Read More >>

Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code

Automating Security Detection Engineering: A hands-on...

Author: Dennis Chow ,  David Bruskin
ISBN: 9781837636419
Format: Paperback
$145.17

This book will equip you with advanced tools and skills to scale your use case lifecycle and enhance your detection...  Read More >>

Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

Bug Bounty from Scratch: A comprehensive guide to discovering...

Author: Francisco Javier Santiago Vázquez
ISBN: 9781803239255
Format: Paperback
$105.57

Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key...  Read More >>

Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity

Malware Development for Ethical Hackers: Learn how to...

Author: Zhassulan Zhussupov
ISBN: 9781801810173
Format: Paperback
$145.17

This book helps you understand malware development with intricate mechanisms of malware development, injection attacks,...  Read More >>

Ethical Password Cracking: Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

Ethical Password Cracking: Decode passwords using John...

Author: James Leyte-Vidal
ISBN: 9781804611265
Format: Paperback
$105.57

From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the...  Read More >>

Security Issues and Solutions in 6G Communications and Beyond

Security Issues and Solutions in 6G Communications and...

Author: Digvijay Pandey ,  Binay Kumar Pandey
ISBN: 9798369347720
Format: Paperback
$380.60

The advent of 6G has brought forth unprecedented advancements, intertwining artificial intelligence, virtual reality,...  Read More >>

Hands-On Blockchain for Python Developers: Empowering Python developers in the world of blockchain and smart contracts

Hands-On Blockchain for Python Developers: Empowering...

Author: Arjuna Sky Kok
ISBN: 9781805121367
Format: Paperback
$126.69

Write popular DeFi and NFT smart contracts with Vyper, a Pythonic programming language, and integrate blockchain...  Read More >>

API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation

API Security for White Hat Hackers: Uncover offensive...

Author: Confidence Staveley ,  Christopher Romeo
ISBN: 9781800560802
Format: Paperback
$118.77

API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify...  Read More >>

Advanced Cybersecurity for Critical Infrastructure

Advanced Cybersecurity for Critical Infrastructure

Author: Black Hat Kathy
ISBN: 9781778903908
Format: Paperback
$329.97

Are you concerned about the security of critical infrastructure? Advanced Cybersecurity for Critical Infrastructure...  Read More >>

Artificial Intelligence for Security: Enhancing Protection in a Changing World

Artificial Intelligence for Security: Enhancing Protection...

Author: Tuomo Sipola ,  Janne Alatalo
ISBN: 9783031574511
Format: Hardback
$527.97

This book discusses the use of artificial intelligence (AI) for security purposes. It discusses the offensive use...  Read More >>

The United Nations Programme on Crime Prevention and Criminal Justice

The United Nations Programme on Crime Prevention and...

Author: Matti Joutsen
ISBN: 9781032770215
Format: Paperback
$77.99

This book documents the evolution of the UN Crime Programme and its changing priorities, from the early focus on...  Read More >>

Counterintelligence in a Cyber World

Counterintelligence in a Cyber World

Author: Paul A. Watters
ISBN: 9783031352898
Format: Paperback
$142.29

 Read More >>

Security Framework for The Internet of Things Applications

Security Framework for The Internet of Things Applications...

Author: Salma Abdalla Hamad (Maquarie university, Australia) ,  Quan Z. Sheng
ISBN: 9781032409276
Format: Hardback
$131.00

The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet...  Read More >>

Human Proxies in Cryptographic Networks: Establishing a new direction to end-to-end encryption with the introduction of the inner envelope in the echo protocol

Human Proxies in Cryptographic Networks: Establishing...

Author: Uni Nurf
ISBN: 9783759705044
Format: Paperback
$55.18

"Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it...  Read More >>

The United Nations Programme on Crime Prevention and Criminal Justice

The United Nations Programme on Crime Prevention and...

Author: Matti Joutsen
ISBN: 9781032770246
Format: Hardback
$284.00

This book documents the evolution of the UN Crime Programme and its changing priorities, from the early focus on...  Read More >>

Scams, Cons, Frauds, and Deceptions: Online and In-person Victimization Schemes

Scams, Cons, Frauds, and Deceptions: Online and In-person...

Author: Sean Byrne (Boston University, USA) ,  James Byrne (University of Massachusetts Lowell, USA)
ISBN: 9781032756455
Format: Hardback
$284.00

This unique volume presents cutting-edge research on the nature and extent of a wide range of scams, cons, frauds,...  Read More >>

The Internet of Things (IoT) Revolution: Connecting Our World

The Internet of Things (IoT) Revolution: Connecting...

Author: V T Harikumar
ISBN: 9798227904430
Format: Paperback
$92.40

""The Internet of Things (IoT) Revolution: Connecting Our World"" is an exhaustive exploration of the transformative...  Read More >>

Shopping Cart
Your cart is empty
Shopping cart
Mailing List