Security services books

970 books were found.

Crypto Millionaires: Blockchain: A Chance for All?

Crypto Millionaires: Blockchain: A Chance for All?

Author: Mateusz Mach
ISBN: 9781032621418
Format: Hardback
$231.00

The story of Blockchain is not just a tale of mathematical experiments. It's primarily a story of the age-old attempt...  Read More >>

The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security

The Shortest Hour: An Applied Approach to Boardroom...

Author: Lee Parrish (Lee Parrish Ventures, USA)
ISBN: 9781032757940
Format: Hardback
$231.00

Lee Parrish provides an example-laden vision to improve cybersecurity governance in the boardroom. Additionally,...  Read More >>

Dash: DNA #12

Dash: DNA #12

Author: Anselm Franke ,  Ho Rui An
ISBN: 9783959055000
Format: Paperback
$39.60

On the cultural and political implications of the rise in dashcam technology The proliferation of dashcam technology...  Read More >>

Social Engineering in Cybersecurity: Threats and Defenses

Social Engineering in Cybersecurity: Threats and Defenses...

Author: Gururaj H L (Manipal Institute of Technology, India) ,  Janhavi V (Vidyavardhaka College of Engg, Karnataka)
ISBN: 9781032524405
Format: Hardback
$231.00

In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.  Read More >>

Information Technology Security and Risk Management: Inductive Cases for Information Security

Information Technology Security and Risk Management:...

Author: Stephen C. Wingreen ,  Amelia Samandari
ISBN: 9781032206158
Format: Paperback
$79.99

Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of...  Read More >>

Ubiquitous and Transparent Security: Challenges and Applications

Ubiquitous and Transparent Security: Challenges and...

Author: A. Suresh Kumar (Graphic Era Deemed to be University, India) ,  Rajesh Kumar Dhanaraj
ISBN: 9781032424071
Format: Hardback
$231.00

"In an increasingly interconnected digital realm, ""Ubiquitous and Transparent Security: Challenges and Applications""...  Read More >>

Information Technology Security and Risk Management: Inductive Cases for Information Security

Information Technology Security and Risk Management:...

Author: Stephen C. Wingreen ,  Amelia Samandari
ISBN: 9781032206141
Format: Hardback
$231.00

Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of...  Read More >>

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science...

Author: Andrew Boyarsky
ISBN: 9781032062853
Format: Hardback
$231.00

This book provides a foundational project management methodology relevant to the emergency management practice,...  Read More >>

The Zero Trust Framework and Privileged Access Management (PAM)

The Zero Trust Framework and Privileged Access Management...

Author: Ravindra Das
ISBN: 9781032746005
Format: Paperback
$62.99

This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure...  Read More >>

The Zero Trust Framework and Privileged Access Management (PAM)

The Zero Trust Framework and Privileged Access Management...

Author: Ravindra Das
ISBN: 9781032742571
Format: Hardback
$147.00

This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure...  Read More >>

Riding the Wave: Applying Project Management Science in the Field of Emergency Management

Riding the Wave: Applying Project Management Science...

Author: Andrew Boyarsky
ISBN: 9781032062860
Format: Paperback
$94.99

This book provides a foundational project management methodology relevant to the emergency management practice,...  Read More >>

The Business of Cyber: Why You Should Question What Your Security Team Are Telling You

The Business of Cyber: Why You Should Question What...

Author: Peter Fagan
ISBN: 9781032462868
Format: Hardback
$231.00

This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners....  Read More >>

Optimal Spending on Cybersecurity Measures: DevOps

Optimal Spending on Cybersecurity Measures: DevOps

Author: Tara Kissoon
ISBN: 9781032518978
Format: Paperback
$94.99

This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces...  Read More >>

Optimal Spending on Cybersecurity Measures: DevOps

Optimal Spending on Cybersecurity Measures: DevOps

Author: Tara Kissoon
ISBN: 9781032518947
Format: Hardback
$231.00

This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces...  Read More >>

Security Without Obscurity: A Guide to PKI Operations

Security Without Obscurity: A Guide to PKI Operations...

Author: Jeff Stapleton ,  W. Clay Epstein
ISBN: 9781032545257
Format: Paperback
$94.99

Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information...  Read More >>

Security Without Obscurity: A Guide to PKI Operations

Security Without Obscurity: A Guide to PKI Operations...

Author: Jeff Stapleton ,  W. Clay Epstein
ISBN: 9781032545226
Format: Hardback
$231.00

Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information...  Read More >>

The Business of Cyber: Why You Should Question What Your Security Team Are Telling You

The Business of Cyber: Why You Should Question What...

Author: Peter Fagan
ISBN: 9781032462905
Format: Paperback
$94.99

 Read More >>

La seguridad en los puertos

La seguridad en los puertos

Author: �lvaro Libr�n Land�buru ,  Jaime Rodrigo de Larrucea
ISBN: 9788415340485
Format: Paperback
$84.45

Esta obra aborda todos los �mbitos relacionados con la aplicaci�n del C�digo de Protecci�n de Buques e Instalaciones...  Read More >>

National Security Surveillance in Southern Africa: An Anti-Capitalist Perspective

National Security Surveillance in Southern Africa: An...

Author: Jane Duncan (University of Johannesburg)
ISBN: 9780755640218
Format: Paperback
$59.99

In spite of Edward Snowden’s disclosures about government abuses of dragnet communication surveillance, the surveillance...  Read More >>

Loss Control Auditing: A Guide for Conducting Fire, Safety, and Security Audits

Loss Control Auditing: A Guide for Conducting Fire,...

Author: E. Scott Dunlap (Eastern Kentucky University, Richmond, USA)
ISBN: 9781032436852
Format: Paperback
$110.00

Loss Control Auditing: A Guide for Conducting Fire, Safety, and Security Audits is a one-stop resource for both...  Read More >>

Supply Chains in Reverse Logistics: The Process Approach for Sustainability and Environmental Protection

Supply Chains in Reverse Logistics: The Process Approach...

Author: Robert Stanisławski ,  Andrzej Szymonik
ISBN: 9781032445281
Format: Paperback
$101.00

To meet the needs of creating modern supply chains, the authors developed this powerful book in which they analyze...  Read More >>

Ransomware: Penetration Testing and Contingency Planning

Ransomware: Penetration Testing and Contingency Planning...

Author: Ravindra Das (President, HTG Solutions, IL, USA)
ISBN: 9781032556673
Format: Hardback
$231.00

Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the...  Read More >>

Sub Categories for
Security services
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List