Read more

Our computer security books and guides will ensure you have a proper understanding of cyber security. They will also help you protect your personal details and data from phishing criminals. These cyber security books offer workplace advice and will help you protect your personal information.

Read less

Computer Security Books

Our computer security books and guides will ensure you have a proper understanding of cyber security. They will also help you protect your personal details and data from phishing criminals. These cyber security books offer workplace advice and will help you protect your personal information.

  • BZAWL

    Dissecting the Hack: The F0rb1dd3n Network, Revised Edition (Paperback)

    Jayson E. Street

    Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network," tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons. The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are "Easter eggs"-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker's search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker's presence on a computer system; and the underlying hacking culture.
    • £16.79
    • RRP £20.99
    • Save £4.20
    More info
  • BXNIY

    The Official (ISC)2 Guide to the CISSP CBK Reference (Hardback)

    John Warsinske

    The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential?meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the new eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Written by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Common and good practices for each objective Common vocabulary and definitions References to widely accepted computing standards Highlights of successful approaches through case studies Whether youve earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.
    • £56.00
    • RRP £70.00
    • Save £14.00
    More info
  • BXIWY

    CompTIA PenTest+ Practice Tests (Paperback)

    Robb Tracy

    The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive and hands-on skills are required worldwide to responsibly perform assessments of IT systems, identify weaknesses, manage the vulnerabilities, and determine if existing cybersecurity practices deviate from accepted practices, configurations and policies. - Five unique 160-question practice tests - Tests cover the five CompTIA PenTest+ objective domains - Two additional 100-question practice exams - A total of 1000 practice test questions This book helps you gain the confidence you need for taking the CompTIA PenTest+ Exam PT0-001. The practice test questions prepare you for test success.
    • £24.79
    • RRP £30.99
    • Save £6.20
    More info
  • BXHUR

    (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide (Paperback)

    Mike Wills

    The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. This comprehensive Official Study Guide--the only study guide officially approved by (ISC)2--covers all objectives of the seven SSCP domains. Access Controls Security Operations and Administration Risk Identification, Monitoring, and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.
    • £38.00
    • RRP £47.50
    • Save £9.50
    More info
  • BWRAU

    Cybersecurity (Paperback)

    Dan Shoemaker (University of D

    CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.
    • £48.44
    • RRP £50.99
    • Save £2.55
    More info
  • BWOFL

    Practical Security (Paperback)

    Roman Zabicki

    Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have a solid foundation if you bring in a dedicated security staff later. Identify the weaknesses in your system, and defend against the attacks most likely to compromise your organization, without needing to become a trained security professional. Computer security is a complex issue. But you don't have to be an expert in all the esoteric details to prevent many common attacks. Attackers are opportunistic and won't use a complex attack when a simple one will do. You can get a lot of benefit without too much complexity, by putting systems and processes in place that ensure you aren't making the obvious mistakes. Secure your systems better, with simple (though not always easy) practices. Plan to patch often to improve your security posture. Identify the most common software vulnerabilities, so you can avoid them when writing software. Discover cryptography - how it works, how easy it is to get wrong, and how to get it right. Configure your Windows computers securely. Defend your organization against phishing attacks with training and technical defenses. Make simple changes to harden your system against attackers. What You Need: You don't need any particular software to follow along with this book. Examples in the book describe security vulnerabilities and how to look for them. These examples will be more interesting if you have access to a code base you've worked on. Similarly, some examples describe network vulnerabilities and how to detect them. These will be more interesting with access to a network you support.
    • £17.20
    • RRP £21.50
    • Save £4.30
    More info
  • BWKCV

    Of Privacy and Power (Hardback)

    Henry Farrell

    How disputes over privacy and security have shaped the relationship between the European Union and the United States and what this means for the future We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and Power investigates how the European Union and United States, the two major regulatory systems in world politics, have regulated privacy and security, and how their agreements and disputes have reshaped the transatlantic relationship. The transatlantic struggle over freedom and security has usually been depicted as a clash between a peace-loving European Union and a belligerent United States. Henry Farrell and Abraham Newman demonstrate how this misses the point. The real dispute was between two transnational coalitions--one favoring security, the other liberty--whose struggles have reshaped the politics of surveillance, e-commerce, and privacy rights. Looking at three large security debates in the period since 9/11, involving Passenger Name Record data, the SWIFT financial messaging controversy, and Edward Snowden's revelations, the authors examine how the powers of border-spanning coalitions have waxed and waned. Globalization has enabled new strategies of action, which security agencies, interior ministries, privacy NGOs, bureaucrats, and other actors exploit as circumstances dictate. The first serious study of how the politics of surveillance has been transformed, Of Privacy and Power offers a fresh view of the role of information and power in a world of economic interdependence.
    • £23.99
    • RRP £24.00
    • Save £0.01
    More info
  • BWFLR

    Practical Cloud Security (Paperback)

    Chris Dotson

    With the fast, competitive evolution of new cloud services, particularly those related to security, cloud deployment is now definitively as secure as on-premises servers, and probably even more secure. This practical book surveys current security challenges and shows security professionals, IT architects, and developers how to meet them while deploying systems to popular cloud services. You'll find up-to-date, cloud-specific security guidance for popular cloud platforms in the areas of cloud and data asset management, identity and access management, vulnerability management, network security, and incident response. Author Chris Dotson offers practical cloud security best practices for multi-vendor cloud environments whether you're just starting to design your cloud environment or have legacy projects to secure.
    • £31.99
    • RRP £39.99
    • Save £8.00
    More info
  • BVKFW

    CEH Certified Ethical Hacker Bundle, Third Edition (Paperback)

    Matt Walker

    Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam. CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, provides an in-depth review that covers 100% of the exam's objectives. CEH Certified Ethical Hacker Practice Exams, Third Edition, tests and reinforces this coverage with 650+ realistic practice questions. The CEH Certified Ethical Hacker Bundle, Third Edition, contains a bonus Quick Review Guide that can be used as the final piece for exam preparation. This content comes in addition to the electronic content included with the bundle's component books. This new edition includes greater emphasis on cloud computing and mobile platforms and addresses new vulnerabilities to the latest technologies and operating systems. In all, the bundle includes more than 1000 accurate questions with detailed answer explanations Electronic content includes the Total Tester customizable exam engine, Quick Review Guide, and searchable PDF copies of both books Readers will save 12% compared to buying the two books separately, and the bonus Quick Review Guide is available only with the bundle
    • £44.79
    • RRP £55.99
    • Save £11.20
    More info
  • BUYMP

    Firewalls Don't Stop Dragons (Paperback)

    Carey Parker

    Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You'll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don't really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves-step by step, without judgment, and with as little jargon as possible.
    • £27.99
    More info
  • BUXAY

    Open Source Intelligence Methods and Tools (Paperback)

    Nihad A. Hassan

    Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises
    • £24.89
    • RRP £24.99
    • Save £0.10
    More info
  • BUWPS

    The Virtual Weapon and International Order (Paperback)

    Lucas Kello

    An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order The cyber revolution is the revolution of our time. The rapid expansion of cyberspace in society brings both promise and peril. It promotes new modes of political cooperation, but it also disrupts interstate dealings and empowers subversive actors who may instigate diplomatic and military crises. Despite significant experience with cyber incidents, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy. Kello draws on a broad range of case studies - including the Stuxnet operation against Iran, the cyberattacks against Sony Pictures, and the disruption of the 2016 U.S. presidential election - to make sense of the contemporary technological revolution. Synthesizing data from government documents, forensic reports of major events, and interviews with senior decision-makers, this important work establishes new theoretical benchmarks to help security experts revise strategy and policy for the unprecedented challenges of our era.
    • £11.69
    • RRP £12.99
    • Save £1.30
    More info
  • BUVIY

    Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Other)

    Wm. Arthur Conklin

    This thoroughly updated IT security textbook covers every topic on CompTIA Security+ exam SY0-501 Learn IT security fundamentals while getting complete coverage of the latest CompTIA Security+ certification exam objectives. Written by a team of leading security academics, this full-color textbook teaches essential computer and network security skills, including communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) is presented in an engaging style and features full-color illustrations. Each chapter includes Learning Objectives, Real-world examples, "Try This!" and "Cross Check" exercises, Tech Tips, Notes, Warnings, Exam Tips, and end-of-chapter quizzes and lab projects. The book also comes with a complete electronic practice exam that mirrors the actual CompTIA Security+ certification exam. * CompTIA Approved Quality Content (CAQC) * Supplemented by Principles of Computer Security Lab Manual, Fifth Edition, available separately * Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams * Answers to the end of chapter sections are not included in the book and are only available to adopting instructors * Electronic content includes test engine with full-length practice exam and a secured book PDF * Written by a team of IT security experts and edited by (ISC)2 vice chairperson Corey D. Schou
    • £68.34
    • RRP £85.42
    • Save £17.08
    More info
  • BUHNB

    The Intelligent Marketer's Guide to Data Privacy (Hardback)

    Robert W. Palmatier

    Firms are collecting and analyzing customer data at an ever increasing rate in response to evidence that data analytics (precision targeting, improved selling) generates a positive return. Yet efforts often ignore customers' privacy concerns and feelings of vulnerability with long-term effects on customers' trust, relationships, and ultimately financial performance. Big data, privacy, and cybersecurity often is relegated to IT and legal teams with minimal regard for customer relationships. This book fills the void by taking a customer-centric approach to privacy. It offers both defensive and offensive marketing-based privacy strategies that strongly position firms in today's data-intensive landscape. The book also helps managers anticipate future consumer and legislative trends. Drawing from the authors' own work and extant research, this book offers a compelling guide for building and implementing big data- and privacy-informed business strategies. Specifically, the book: * -Describes the consumer psychology of privacy * -Deconstructs relevant legal and regulatory issues * - Offers defensive privacy strategies * - Describes offensive privacy strategies * Provides an executive summary with the Six Tenets for Effective Privacy Marketing This book will be useful to managers, students, or the casual reader who is interested in how and why big data and consumer privacy are transforming business. Moving beyond summary privacy insights, the book also offers a detailed and compelling action plan for improving performance by protecting against privacy threats as well as developing and implementing offensive privacy strategy. In the future, many firms will be competing through an integrated, customer-centric big data privacy strategy and this book will guide managers in this journey.
    • £23.69
    • RRP £24.99
    • Save £1.30
    More info
  • BUGJY

    Breaking and Entering (Paperback)

    Jeremy N. Smith

    Hackers know everything about us. We know almost nothing about them. Until now. The hacker now known as Alien entered MIT in 1998, intending to major in aerospace engineering. Almost immediately, she was recruited to join a secret student group scaling walls, breaking into buildings, pulling elaborate pranks, and exploring computer systems. Within a year, one of her hall mates was dead and two others were arraigned. And Alien's adventures were only beginning. Breaking and Entering is a whirlwind history of the last 20 years of hacking and cybersecurity. As Alien develops from teenage novice to international expert, she joins the secret vanguard of our digitised world, and reveals the forces at work behind our everyday technology.
    • £11.99
    • RRP £14.99
    • Save £3.00
    More info
  • BTYJH

    My Online Privacy for Seniors (Paperback)

    Jason Rich

    My Online Privacy for Seniors is an exceptionally easy and complete guide to protecting your privacy while you take advantage of the extraordinary resources available to you through the Internet and your mobile devices. It approaches every topic from a senior's point of view, using meaningful examples, step-by-step tasks, large text, close-up screen shots, and a custom full-color interior designed for comfortable reading. Top beginning technology author Jason R. Rich covers all you need to know to: Safely surf the Internet (and gain some control over the ads you're shown) Protect yourself when working with emails Securely handle online banking and shopping Stay safe on social media, and when sharing photos online Safely store data, documents, and files in the cloud Secure your entertainment options Customize security on your smartphone, tablet, PC, or Mac Work with smart appliances and home security tools Protect your children and grandchildren online Take the right steps immediately if you're victimized by cybercrime, identity theft, or an online scam You don't have to avoid today's amazing digital world: you can enrich your life, deepen your connections, and still keep yourself safe.
    • £15.99
    • RRP £19.99
    • Save £4.00
    More info
  • BTPSE

    Surveillance Valley (Paperback)

    Yasha Levine

    EVERYTHING WE HAVE BEEN TOLD ABOUT THE DEMOCRATIC NATURE OF THE INTERNET IS A MARKETING PLOY. As the Cambridge Analytica scandal has shown, private corporations consider it their right to use our data (and by extension, us) which ever way they see fit. Tempted by their appealing organisational and diagnostic tools, we have allowed private internet corporations access to the most intimate corners of our lives. But the internet was developed, from the outset, as a weapon. Looking at the hidden origins of many internet corporations and platforms, Levine shows that this is a function, not a bug of the online experience. Conceived as a surveillance tool by ARPA to control insurgents in the Vietnam War, the internet is now essential to our lives. This book investigates the troubling and unavoidable truth of its history and the unfathomable power of the corporations who now more or less own it. Without this book, your picture of contemporary society will be missing an essential piece of the puzzle.
    • £11.99
    • RRP £14.99
    • Save £3.00
    More info
  • BTOMT

    200+ Ways to Protect Your Privacy (Paperback)

    Jeni Rogers

    Discover simple strategies for protecting your personal and confidential information on and offline with this essential and easy-to-understand guide. We all know that the internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store--and even you have the ability to unknowingly reveal your private information to everyone from thieves to busybodies. But you don't need to hire a specialist to keep your information safe--you can do it yourself with these 200+ easy-to-implement tactics, some of which include: --Shredding hard copies of bills -- Turning off Bluetooth when not in use -- Using a firewall -- Hiding spare keys in an unusual place Keeping your information secure lies in your hands--make sure you're not putting yourself at risk in your daily habits with this essential guide.
    • £8.79
    • RRP £10.99
    • Save £2.20
    More info
  • BTLNU

    Biometrics: A Very Short Introduction (Paperback)

    Michael Fairhurst (Professor o

    We live in a society which is increasingly interconnected, in which communication between individuals is mostly mediated via some electronic platform, and transactions are often carried out remotely. In such a world, traditional notions of trust and confidence in the identity of those with whom we are interacting, taken for granted in the past, can be much less reliable. Biometrics - the scientific discipline of identifying individuals by means of the measurement of unique personal attributes - provides a reliable means of establishing or confirming an individual's identity. These attributes include facial appearance, fingerprints, iris patterning, the voice, the way we write, or even the way we walk. The new technologies of biometrics have a wide range of practical applications, from securing mobile phones and laptops to establishing identity in bank transactions, travel documents, and national identity cards. This Very Short Introduction considers the capabilities of biometrics-based identity checking, from first principles to the practicalities of using different types of identification data. Michael Fairhurst looks at the basic techniques in use today, ongoing developments in system design, and emerging technologies, all aimed at improving precision in identification, and providing solutions to an increasingly wide range of practical problems. Considering how they may continue to develop in the future, Fairhurst explores the benefits and limitations of these pervasive and powerful technologies, and how they can effectively support our increasingly interconnected society. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.
    • £6.39
    • RRP £7.99
    • Save £1.60
    More info
  • BTESG

    Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Other)

    Wm. Arthur Conklin

    This thoroughly updated IT security textbook covers every topic on CompTIA Security+ exam SY0-501 Learn IT security fundamentals while getting complete coverage of the latest CompTIA Security+ certification exam objectives. Written by a team of leading security academics, this full-color textbook teaches essential computer and network security skills, including communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) is presented in an engaging style and features full-color illustrations. Each chapter includes Learning Objectives, Real-world examples, "Try This!" and "Cross Check" exercises, Tech Tips, Notes, Warnings, Exam Tips, and end-of-chapter quizzes and lab projects. The book also comes with a complete electronic practice exam that mirrors the actual CompTIA Security+ certification exam. * CompTIA Approved Quality Content (CAQC) * Supplemented by Principles of Computer Security Lab Manual, Fifth Edition, available separately * Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams * Answers to the end of chapter sections are not included in the book and are only available to adopting instructors * Electronic content includes test engine with full-length practice exam and a secured book PDF * Written by a team of IT security experts and edited by (ISC)2 vice chairperson Corey D. Schou
    • £68.34
    • RRP £85.42
    • Save £17.08
    More info
  • BTARP

    Industry of Anonymity (Hardback)

    Jonathan Lusthaus

    The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hotspots. Cybercrime seems invisible. Attacks arrive out of nowhere, their origins hidden by layers of sophisticated technology. Only the victims are clear. But every crime has its perpetrator-specific individuals or groups sitting somewhere behind keyboards and screens. Jonathan Lusthaus lifts the veil on the world of these cybercriminals in the most extensive account yet of the lives they lead, and the vast international industry they have created. We are long past the age of the lone adolescent hacker tapping away in his parents' basement. Cybercrime now operates like a business. Its goods and services may be illicit, but it is highly organized, complex, driven by profit, and globally interconnected. Having traveled to cybercrime hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, Lusthaus takes us inside this murky underworld and reveals how this business works. He explains the strategies criminals use to build a thriving industry in a low-trust environment characterized by a precarious combination of anonymity and teamwork. Crime takes hold where there is more technical talent than legitimate opportunity, and where authorities turn a blind eye-perhaps for a price. In the fight against cybercrime, understanding what drives people into this industry is as important as advanced security. Based on seven years of fieldwork from Eastern Europe to West Africa, Industry of Anonymity is a compelling and revealing study of a rational business model which, however much we might wish otherwise, has become a defining feature of the modern world.
    • £31.95
    More info
  • BTABK

    CompTIA PenTest+ Study Guide (Paperback)

    Mike Chapple

    World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 offers comprehensive preparation for the newest intermediate cybersecurity certification exam. With expert coverage of Exam PT0-001 objectives, this book is your ideal companion throughout all stages of study; whether you're just embarking on your certification journey or finalizing preparations for the big day, this invaluable resource helps you solidify your understanding of essential skills and concepts. Access to the Sybex online learning environment allows you to study anytime, anywhere with electronic flashcards, a searchable glossary, and more, while hundreds of practice exam questions help you step up your preparations and avoid surprises on exam day. The CompTIA PenTest+ certification validates your skills and knowledge surrounding second-generation penetration testing, vulnerability assessment, and vulnerability management on a variety of systems and devices, making it the latest go-to qualification in an increasingly mobile world. This book contains everything you need to prepare; identify what you already know, learn what you don't know, and face the exam with full confidence! Perform security assessments on desktops and mobile devices, as well as cloud, IoT, industrial and embedded systems Identify security weaknesses and manage system vulnerabilities Ensure that existing cybersecurity practices, configurations, and policies conform with current best practices Simulate cyberattacks to pinpoint security weaknesses in operating systems, networks, and applications As our information technology advances, so do the threats against it. It's an arms race for complexity and sophistication, and the expansion of networked devices and the Internet of Things has integrated cybersecurity into nearly every aspect of our lives. The PenTest+ certification equips you with the skills you need to identify potential problems--and fix them--and the CompTIA PenTest+ Study Guide: Exam PT0-001 is the central component of a complete preparation plan.
    • £38.00
    • RRP £47.50
    • Save £9.50
    More info
  • BSZSM

    Understanding Security Issues (Paperback)

    Scott Donaldson

    In an increasingly complex and interconnected world, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses a spectrum of security awareness issues and how this awareness can help to reduce the risk of becoming a victim: The security mindset and good security practices. Assets that need to be protected at work and at home. Threats that face every individual and business, all the time. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
    • £19.00
    More info
  • BRYFN

    The Mathematics of Secrets (Paperback)

    Joshua Holden

    The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http: //press.princeton.edu/titles/10826.html.
    • £14.99
    More info

Understand everything you need to know to keep you, your details and data safe online and off with our computer security books.

Keeping you safe online and off

Although the internet is a great tool in our modern world, safety is an important issue. With so many risks in working and communicating online, learn everything you need to know to stay safe online with one of our cyber security books.

Helping you put security first

Whatever you use your computer for, whether it’s as part of a business or just for home use; keeping your data and details a secret can be tricky with so many threats out there. Our books on cyber security will help you always put security first.