Network security
Sorting
Bestseller Sorting collapsed
Bestseller
Name: A-Z
Name: Z-A
Price ascending
Price descending
Publication Date ascending
Publication Date descending

E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This book includes the post-conference proceedings of the 21st RoboCup International Symposium, held in Nagoya, Japan, in September 2017.
Read more
E-book
Price
0
64.99 £
E-book
0
0
Price
64.99 £
This book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.
Read more
E-book
Price
0
179.50 £
E-book
0
0
Price
179.50 £
This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions.
Read more
E-book
Price
0
54.99 £
E-book
0
0
Price
54.99 £
This text examines the goals of data analysis with respect to enhancing knowledge, and identifies data summarization and correlation analysis as the core issues.
Read more
E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2018, held in St.
Read more
E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This book constitutes the proceedings of the 15th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2018, held in Mallorca, Spain, in October 2018.
Read more
E-book
Price
0
129.50 £
E-book
0
0
Price
129.50 £
This book presents the latest trends in attacks and protection methods of Critical Infrastructures.
Read more
E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
Read more
E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
Read more
E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
Read more
E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
Read more
E-book
Price
0
159.50 £
E-book
0
0
Price
159.50 £
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices.
Read more
E-book
Price
0
89.50 £
E-book
0
0
Price
89.50 £
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018.
Read more
E-book
Price
0
19.99 £
E-book
0
0
Price
19.99 £
In a world where cybersecurity threats evolve daily, it's time to leave traditional, flawed security models behind.
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
No detailed description available for "e;Automating Security Detection Engineering"e;.
Read more
E-book
Price
0
22.99 £
E-book
0
0
Price
22.99 £
The Ultimate GDPR Practitioner Guide (2nd Edition) provides those tasked with implementing Data Protection processes, useful information and supporting case law to aid in achieving compliance with GDPR.
Read more
E-book
Price
0
7.99 £
E-book
0
0
Price
7.99 £
Regulatory compliance has historically been a concern of only a company's legal and finance departments.
Read more
E-book
Price
0
35.99 £
E-book
0
0
Price
35.99 £
Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry expertsKey FeaturesGet simple, clear, and practical advice for everyone from CEOs to security operationsOrganize your Zero Trust journey into role-by-role execution stagesIntegrate real-world implementation experience with global Zero Trust standardsPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionZero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network.
Read more
E-book
Price
0
50.00 £
E-book
0
0
Price
50.00 £
Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world.
Read more
E-book
Price
0
50.00 £
E-book
0
0
Price
50.00 £
This book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.
Read more
E-book
Price
0
50.00 £
E-book
0
0
Price
50.00 £
This book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.
Read more
E-book
Price
0
27.99 £
E-book
0
0
Price
27.99 £
Get hands-on experience on concepts of Bug Bounty HuntingKey FeaturesGet well-versed with the fundamentals of Bug Bounty HuntingHands-on experience on using different tools for bug huntingLearn to write a bug bounty report according to the different vulnerabilities and its analysisBook DescriptionBug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same.
Read more
E-book
Price
0
29.95 £
E-book
0
0
Price
29.95 £
Web application security as part of an ISO 27001-compliant information security management systemWeb application vulnerabilities are a common point of intrusion for cyber criminals.
Read more
E-book
Price
0
24.95 £
E-book
0
0
Price
24.95 £
Preparation for the Certified Penetration Testing Engineer (CPTE) examinationPenetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack.
Read more
E-book
Price
0
37.99 £
E-book
0
0
Price
37.99 £
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey FeaturesLearn best practices to secure your data from the device to the cloudUse systems security engineering and privacy-by-design principles to design a secure IoT ecosystemA practical guide that will help you design and implement cyber security strategies for your organizationBook DescriptionWith the advent of the Internet of Things (IoT), businesses have to defend against new types of threat.
Read more

E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
No detailed description available for "e;Securing Industrial Control Systems and Safety Instrumented Systems"e;.
Read more
E-book
Price
0
34.99 £
E-book
0
0
Price
34.99 £
Learn how to pentest your hardware with the most common attract techniques and patternsKey FeaturesExplore various pentesting tools and techniques to secure your hardware infrastructureProtect your hardware by finding potential entry points like glitchesFind the best practices for securely designing your productsBook DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you.
Read more
E-book
Price
0
28.99 £
E-book
0
0
Price
28.99 £
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniquesImplement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutionsUnderstand how to create cyber-threat defense solutions effectivelyBook DescriptionAre you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users?
Read more
E-book
Price
0
22.99 £
E-book
0
0
Price
22.99 £
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey FeaturesUnderstand SQL injection and its effects on websites and other systemsGet hands-on with SQL injection using both manual and automated toolsExplore practical tips for various attack and defense strategies relating to SQL injectionBook DescriptionSQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet.
Read more
E-book
Price
0
25.99 £
E-book
0
0
Price
25.99 £
Gain proficiency in monitoring infrastructure along with focusing on cloud backup and recoveryKey FeaturesExplore the 3-2-1 rule of backups in Veeam to keep your data safeGain in-depth knowledge of NAS backups and Scale-Out Repositories to use in your virtual environmentDiscover Veeam's monitoring and reporting utility - Veeam ONE - along with Linux and Window's proxyBook DescriptionVeeam is one of the leading modern data protection solutions, and mastering this technology can help you to protect your virtual environments effectively.
Read more
E-book
Price
0
44.99 £
E-book
0
0
Price
44.99 £
This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security.
Read more
E-book
Price
0
49.99 £
E-book
0
0
Price
49.99 £
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurityKey FeaturesCovers the latest security threats and defense strategies for 2020Introduces techniques and skillsets required to conduct threat hunting and deal with a system breachProvides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much moreBook DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
Read more
E-book
Price
0
30.99 £
E-book
0
0
Price
30.99 £
Master the Metasploit Framework and become an expert in penetration testing.
Read more
E-book
Price
0
35.99 £
E-book
0
0
Price
35.99 £
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety of Kali Linux toolsUse PcapXray to perform timeline analysis of malware and network activityImplement the concept of cryptographic hashing and imaging using Kali LinuxBook DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics.
Read more
E-book
Price
0
35.99 £
E-book
0
0
Price
35.99 £
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyPerform malware analysis for effective incident responseExplore real-life scenarios that effectively use threat intelligence and modeling techniquesBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks.
Read more
E-book
Price
0
28.99 £
E-book
0
0
Price
28.99 £
Learn how to apply modern AI to create powerful cybersecurity solutions for malware, pentesting, social engineering, data privacy, and intrusion detectionKey FeaturesManage data of varying complexity to protect your system using the Python ecosystemApply ML to pentesting, malware, data privacy, intrusion detection system(IDS) and social engineeringAutomate your daily workflow by addressing various security challenges using the recipes covered in the bookBook DescriptionOrganizations today face a major threat in terms of cybersecurity, from malicious URLs to credential reuse, and having robust security systems can make all the difference.
Read more
E-book
Price
0
26.99 £
E-book
0
0
Price
26.99 £
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey FeaturesLearn foundational concepts for effective threat hunting teams in pursuit of cyber adversariesRecognize processes and requirements for executing and conducting a huntCustomize a defensive cyber framework needed to grow and mature a hunt teamBook DescriptionThreat hunting is a concept that takes traditional cyber defense and spins it onto its head.
Read more
E-book
Price
0
28.99 £
E-book
0
0
Price
28.99 £
Protect your cloud, virtual, and on-premises environments by implementing Veeam's powerful backup and replication technologyKey FeaturesGain in-depth knowledge of CDP and hardened repositories that you can use in your virtual environmentExplore Veeam's monitoring and reporting utility - Veeam ONE - along with Linux proxy enhancementsWork with the new Veeam Disaster Recovery Orchestrator (Orchestrator) for testing failovers and backupsBook DescriptionVeeam is one of the leading modern data protection solutions, making it a necessary skill for anyone responsible for securing virtual environments.
Read more
E-book
Price
0
49.99 £
E-book
0
0
Price
49.99 £
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information security teamsEnhance your cybersecurity skills with practice questions and mock testsBook DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification examKey FeaturesLearn how to look at technology from the standpoint of an attackerUnderstand the methods that attackers use to infiltrate networksPrepare to take and pass the exam in one attempt with the help of hands-on examples and mock testsBook DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetration tester, malware analyst, digital forensics analyst, CISO, and more rolesUnderstand different key areas in each role and prepare for themBook DescriptionThis book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas.
Read more
E-book
Price
0
27.99 £
E-book
0
0
Price
27.99 £
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted with a range of open-source tools and techniques for memory forensicsBook DescriptionMemory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis.
Read more
E-book
Price
0
31.99 £
E-book
0
0
Price
31.99 £
Start your Cybersecurity career with expert advice on how to get certified, find your first job, and progressPurchase of the print or Kindle book includes a free eBook in PDF formatKey FeaturesLearn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurityExplore expert tips relating to career growth and certification optionsAccess informative content from a panel of experienced cybersecurity expertsBook DescriptionCybersecurity is an emerging career trend and will continue to become increasingly important.
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
Learn advanced threat analysis techniques in practice by implementing Elastic Stack security featuresKey FeaturesGet started with Elastic Security configuration and featuresLeverage Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook DescriptionThreat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats.
Read more
E-book
Price
0
49.99 £
E-book
0
0
Price
49.99 £
Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information security teamsEnhance your cybersecurity skills with practice questions and mock testsBook DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market.
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
Design and implement a secure end-to-end desktop management solution with Microsoft Endpoint ManagerKey FeaturesLearn everything you need to know about deploying and managing Windows on physical and cloud PCsSimplify remote working for cloud-managed cloud PCs via new service Windows 365Benefit from the authors' experience of managing physical endpoints and traditional virtual desktop infrastructures (VDI)Book DescriptionMicrosoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them.
Read more
E-book
Price
0
27.99 £
E-book
0
0
Price
27.99 £
Pass the Certified Information Systems Security Professional Exam with our all-new set of practice exams designed to simulate the latest exam versionKey FeaturesGet ready to take the CISSP exam with the help of practice questions covering all concepts tested in the examDiscover and fill the gaps in your knowledge with detailed explanations of answersTake two full practice exams that simulate CISSP version May 2021Book DescriptionThe CISSP exam is for security professionals who understand that poor security can put a company out of business.
Read more
E-book
Price
0
25.99 £
E-book
0
0
Price
25.99 £
Gain basic skills in network forensics and learn how to apply them effectivelyKey FeaturesInvestigate network threats with easePractice forensics tasks such as intrusion detection, network analysis, and scanningLearn forensics investigation at the network levelBook DescriptionNetwork forensics is a subset of digital forensics that deals with network attacks and their investigation.
Read more
E-book
Price
0
3.99 £
E-book
0
0
Price
3.99 £
Insider threat is a real issue, pain point, and can be a challenge in any organization of any size or industry.
Read more