Network security books

10062 books were found.

Mastering OAuth 2.0

Mastering OAuth 2.0

Author: Charles Bihis
ISBN: 9781784395407
Format: Undefined
$93.12

Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more...  Read More >>

Learning iOS Penetration Testing

Learning iOS Penetration Testing

Author: Swaroop Yermalkar
ISBN: 9781785883255
Format: Undefined
$85.36

Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests About This Book...  Read More >>

iOS Forensics Cookbook

iOS Forensics Cookbook

Author: Bhanu Birani ,  Mayank Birani
ISBN: 9781783988464
Format: Undefined
$72.42

Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics About This Book...  Read More >>

Mastering Kali Linux Wireless Pentesting

Mastering Kali Linux Wireless Pentesting

Author: Jilumudi Raghu Ram ,  Brian Sak
ISBN: 9781785285561
Format: Undefined
$103.47

Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About...  Read More >>

Learning Network Forensics

Learning Network Forensics

Author: Samir Datt
ISBN: 9781782174905
Format: Undefined
$103.47

Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About...  Read More >>

Kali Linux Web Penetration Testing Cookbook

Kali Linux Web Penetration Testing Cookbook

Author: Gilberto Najera-Gutierrez
ISBN: 9781784392918
Format: Undefined
$103.47

Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 About This Book...  Read More >>

Mastering Modern Web Penetration Testing

Mastering Modern Web Penetration Testing

Author: Prakhar Prasad
ISBN: 9781785284588
Format: Undefined
$93.12

Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker...  Read More >>

Kali Linux Intrusion and Exploitation Cookbook

Kali Linux Intrusion and Exploitation Cookbook

Author: Ishan Girdhar ,  Dhruv Shah
ISBN: 9781783982165
Format: Undefined
$93.12

Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals...  Read More >>

Nmap: Network Exploration and Security Auditing Cookbook -

Nmap: Network Exploration and Security Auditing Cookbook...

Author: Paulino Calderon Pale
ISBN: 9781786467454
Format: Undefined
$103.47

This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone...  Read More >>

Security, Trust and Privacy Models, and Architectures in IoT Environments

Security, Trust and Privacy Models, and Architectures...

Author: Lidia Fotia ,  Fabrizio Messina
ISBN: 9783031219399
Format: Hardback
$413.97

This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments....  Read More >>

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP)

Nuclear Power Plants: Innovative Technologies for Instrumentation...

Author: Yang Xu ,  Yongbin Sun
ISBN: 9789811911835
Format: Paperback
$517.47

This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial...  Read More >>

Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence

Explainable Artificial Intelligence for Cyber Security:...

Author: Mohiuddin Ahmed ,  Sheikh Rabiul Islam
ISBN: 9783030966324
Format: Paperback
$362.22

This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial,...  Read More >>

Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security

Aligning Security Operations with the MITRE ATT&CK Framework:...

Author: Rebecca Blair
ISBN: 9781804614266
Format: Paperback
$131.97

Align your SOC with the ATT&CK framework and follow practical examples for successful implementation Purchase of...  Read More >>

Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices

Guide to Cybersecurity in Digital Transformation: Trends,...

Author: Dietmar P.F. Möller
ISBN: 9783031268441
Format: Hardback
$181.10

In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including...  Read More >>

Navigating the Dark Waters of Cybersecurity Incident Response

Navigating the Dark Waters of Cybersecurity Incident...

Author: Matthew C Smith
ISBN: 9781088108864
Format: Paperback
$47.39

"Welcome to ""Navigating the Dark Waters of Cybersecurity Incident Response,"" a comprehensive guide that will help...  Read More >>

Recent Innovations in Computing: Proceedings of ICRIC 2021, Volume 2

Recent Innovations in Computing: Proceedings of ICRIC...

Author: Pradeep Kumar Singh ,  Yashwant Singh
ISBN: 9789811688942
Format: Paperback
$517.47

This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing...  Read More >>

Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings

Security Standardisation Research: 8th International...

Author: Felix Günther ,  Julia Hesse
ISBN: 9783031307300
Format: Paperback
$129.35

This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research,...  Read More >>

Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I

Advances in Cryptology – EUROCRYPT 2023: 42nd Annual...

Author: Carmit Hazay ,  Martijn Stam
ISBN: 9783031305443
Format: Paperback
$232.85

This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference...  Read More >>

The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics

The NICE Cyber Security Framework: Cyber Security Intelligence...

Author: Izzat Alsmadi
ISBN: 9783031216503
Format: Hardback
$232.85

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education...  Read More >>

Don't Trust Your Gut: Using Data to Get What You Really Want in Life

Don't Trust Your Gut: Using Data to Get What You Really...

Author: Seth Stephens-Davidowitz
ISBN: 9780062880925
Format: Paperback
$50.13

""Seth Stephens-Davidowitz is more than a data scientist. He is a prophet for how to use the data revolution to...  Read More >>

Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021

Security, Privacy and Data Analytics: Select Proceedings...

Author: Udai Pratap Rao ,  Sankita J. Patel
ISBN: 9789811690914
Format: Paperback
$284.60

The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence,...  Read More >>

Optimización de redes inalámbricas industriales mediante diseño y evaluación

Optimización de redes inalámbricas industriales mediante...

Author: Anne Jakson
ISBN: 9781805281337
Format: Paperback
$113.52

"Optimización de redes inalámbricas industriales mediante diseño...  Read More >>

Machine Learning Techniques for Cybersecurity

Machine Learning Techniques for Cybersecurity

Author: Elisa Bertino ,  Sonam Bhardwaj
ISBN: 9783031282584
Format: Hardback
$103.47

Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive...  Read More >>

The Gambler and the Scholars: Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology

The Gambler and the Scholars: Herbert Yardley, William...

Author: John F. Dooley
ISBN: 9783031283178
Format: Hardback
$90.54

In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis...  Read More >>

Deep Learning for Security and Privacy Preservation in IoT

Deep Learning for Security and Privacy Preservation...

Author: Aaisha Makkar ,  Neeraj Kumar
ISBN: 9789811661884
Format: Paperback
$413.97

This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List