Network security books

10062 books were found.

Constructive Side-Channel Analysis and Secure Design: 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings

Constructive Side-Channel Analysis and Secure Design:...

Author: Naofumi Homma ,  Romain Wacquez
ISBN: 9783031575426
Format: Paperback
$129.35

 Read More >>

Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs)

Enhancing Security in Public Spaces Through Generative...

Author: Sivaram Ponnusamy ,  Jilali Antari
ISBN: 9798369349397
Format: Paperback
$646.80

""This book delves into the fascinating realm of GANs, a groundbreaking area of machine learning that has transformative...  Read More >>

The Cybersecurity Guide to Governance, Risk, and Compliance

The Cybersecurity Guide to Governance, Risk, and Compliance...

Author: Jason Edwards (Amazon, Cibolo, TX) ,  Griffin Weaver (University of Utah; Brigham Young University)
ISBN: 9781394250196
Format: Hardback
$171.95

""Cyber Security Governance & Risk Management is the monitoring of compliance with agreed cyber security policies...  Read More >>

The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics

The NICE Cyber Security Framework: Cyber Security Intelligence...

Author: Izzat Alsmadi
ISBN: 9783031216534
Format: Paperback
$142.29

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education...  Read More >>

Zero Trust Networks: Building Secure Systems in Untrusted Network (2nd Edition)

Zero Trust Networks: Building Secure Systems in Untrusted...

Author: Christina Morillo ,  Evan Gilman
ISBN: 9798874722548
Format: Audio
$131.97

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no...  Read More >>

Zero Trust Networks: Building Secure Systems in Untrusted Network (2nd Edition)

Zero Trust Networks: Building Secure Systems in Untrusted...

Author: Christina Morillo ,  Evan Gilman
ISBN: 9798874722555
Format: Audio
$121.31

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no...  Read More >>

Shadow Codes: The Master Spy of the Digital Age

Shadow Codes: The Master Spy of the Digital Age

Author: Bajwa
ISBN: 9789694592619
Format: Paperback
$39.57

"Dive deep into the enigmatic world of cyber espionage with ""Shadow Codes: The Master Spy of the Digital Age.""...  Read More >>

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Security Monitoring with Wazuh: A hands-on guide to...

Author: Rajneesh Gupta ,  Santiago Bassett
ISBN: 9781837632152
Format: Paperback
$118.77

Explore the implementation of Wazuh for effective security monitoring through use cases and demonstrations of how...  Read More >>

Mastering Command & Control: Exploring C2 Frameworks using Kali Linux

Mastering Command & Control: Exploring C2 Frameworks...

Author: Daniel W Dieterle
ISBN: 9798322622772
Format: Paperback
$79.20

"In the ever-evolving landscape of cybersecurity, proficiency in Command and Control (C2) frameworks is not just...  Read More >>

Proceedings of Second International Conference on Intelligent System: ICIS 2023

Proceedings of Second International Conference on Intelligent...

Author: João Manuel R. S. Tavares ,  Souvik Pal
ISBN: 9789819989751
Format: Hardback
$517.47

This book gathers selected high-quality research papers presented at the Second International Conference on Intelligent...  Read More >>

Data-Centric Security in Software Defined Networks (SDN)

Data-Centric Security in Software Defined Networks (SDN)...

Author: Marek Amanowicz ,  Sebastian Szwaczyk
ISBN: 9783031555169
Format: Hardback
$422.37

The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined...  Read More >>

Online Identity - An Essential Guide

Online Identity - An Essential Guide

Author: Amit Kumar Dewangan ,  Rohit Raja
ISBN: 9780854661497
Format: Hardback
$265.10

In today's digital age, having a strong online identity has become more important than ever. This book aims to explore...  Read More >>

Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning

Combatting Cyber Terrorism: A guide to understanding...

Author: Richard Bingley
ISBN: 9781787785199
Format: Paperback
$131.97

This guide analyses the evolution of cyber terrorism and what organisations can do to prevent this threat from exerting...  Read More >>

Cybersecurity Measures for Municipal Administrators & Government Agencies

Cybersecurity Measures for Municipal Administrators...

Author: Aaron Locklear
ISBN: 9798325149443
Format: Paperback
$26.40

"The rapid growth of digital technology is undeniably a boon, but it indisputably brings with it a host of new concerns....  Read More >>

Safe, Secure, Ethical, Responsible Technologies and Emerging Applications: First EAI International Conference, SAFER-TEA 2023, Yaoundé, Cameroon, October 25-27, 2023, Proceedings

Safe, Secure, Ethical, Responsible Technologies and...

Author: Franklin Tchakounte ,  Marcellin Atemkeng
ISBN: 9783031563959
Format: Paperback
$263.97

This book constitutes the refereed proceedings of the First EAI International Conference on Safe, Secure, Ethical,...  Read More >>

Physical Layer Security for 6G Networks

Physical Layer Security for 6G Networks

Author: Trung Q. Duong (Canada Excellence Research Chair, Memorial University of Newfoundland, Canada) ,  Junqing Zhang (Senior Lecturer, University of Liverpool, Department of Electrical Engineering and Electronics, UK)
ISBN: 9781839536915
Format: Hardback
$349.31

Addressing the physical layer security challenges and proposing efficient and resilient physical layer security...  Read More >>

Mastering CMMC 2.0: A Comprehensive Guide to Implementing Cybersecurity Maturity in Defense Contracting

Mastering CMMC 2.0: A Comprehensive Guide to Implementing...

Author: Edgardo Fernandez Climent
ISBN: 9798324903312
Format: Paperback
$65.97

"""Mastering CMMC 2.0: A Comprehensive Guide to Implementing Cybersecurity Maturity in Defense Contracting"" is...  Read More >>

Generative AI Security: Theories and Practices

Generative AI Security: Theories and Practices

Author: Ken Huang ,  Yang Wang
ISBN: 9783031542510
Format: Hardback
$232.85

This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive...  Read More >>

Introduction to One Digital Identity: Strategies, Innovations, and Future Trends

Introduction to One Digital Identity: Strategies, Innovations,...

Author: Shivakumar R. Goniwada
ISBN: 9798868802546
Format: Paperback
$145.17

Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging...  Read More >>

Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

Emerging ICT Technologies and Cybersecurity: From AI...

Author: Kutub Thakur ,  Al-Sakib Khan Pathan
ISBN: 9783031277672
Format: Paperback
$142.29

This book introduces some fundamentals of information and communication technology (ICT) and other current and future...  Read More >>

International Conference on IoT, Intelligent Computing and Security: Select Proceedings of IICS 2021

International Conference on IoT, Intelligent Computing...

Author: Rajeev Agrawal ,  Pabitra Mitra
ISBN: 9789811981388
Format: Paperback
$517.47

This book comprises select peer-reviewed papers from the International Conference on IoT, Intelligent Computing...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List