Network security books

9855 books were found.

Kali Linux – Assuring Security by Penetration Testing

Kali Linux – Assuring Security by Penetration Testing...

Author: Lee Allen ,  Tedi Heriyanto
ISBN: 9781849519489
Format: Undefined
$93.12

Written as an interactive tutorial, this book covers the core of Kali Linux with realworld examples and step by...  Read More >>

Gitolite Essentials

Gitolite Essentials

Author: Sitaram Chamarty
ISBN: 9781783282371
Format: Undefined
$62.07

The book is written to suit an easyreading style, using typical problems in access control to illustrate the need...  Read More >>

Mastering Metasploit

Mastering Metasploit

Author: Nipun Jaswal
ISBN: 9781782162223
Format: Undefined
$103.47

Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This...  Read More >>

Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning

Author: G. Samaraweera ,  J. Chang
ISBN: 9781617298042
Format: Paperback
$158.37

Privacy-Preserving Machine Learning is a practical guide to keeping ML data anonymous and secure. You'll learn the...  Read More >>

Mastering Python Network Automation: Automating Container Orchestration, Configuration, and Networking with Terraform, Calico, HAProxy, and Istio

Mastering Python Network Automation: Automating Container...

Author: Tim Peters
ISBN: 9788196228552
Format: Paperback
$158.37

"Numerous sample programs & examples demonstrating the application of python tools to streamline network automation...  Read More >>

Russia's Evolution Toward a Unified Strategic Operation: The Influence of Geography and Conventional Capacity

Russia's Evolution Toward a Unified Strategic Operation:...

Author: Clint Reach ,  Alyssa Demus
ISBN: 9781977409355
Format: Paperback
$126.72

"""RAND researchers examine the reasons behind Russia's evolution toward a unified strategic operation, as well...  Read More >>

Digital Forensics with Kali Linux: Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x

Digital Forensics with Kali Linux: Enhance your investigation...

Author: Shiva V. N. Parasram
ISBN: 9781837635153
Format: Paperback
$118.77

This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic...  Read More >>

.NET MAUI for C# Developers: Build cross-platform mobile and desktop applications

.NET MAUI for C# Developers: Build cross-platform mobile...

Author: Jesse Liberty ,  Rodrigo Juarez
ISBN: 9781837631698
Format: Paperback
$105.57

A practical guide to mastering C# and .NET MAUI to build native cross-platform apps with a single codebase Purchase...  Read More >>

Ethical Hacking Volume 3: Scanning Concepts: Data/Device Protection

Ethical Hacking Volume 3: Scanning Concepts: Data/Device...

Author: Charles Vance
ISBN: 9798391376767
Format: Paperback
$26.37

"This book is the third volume in the ""Ethical Hacking"" series, which is a set of 21 comprehensive guides designed...  Read More >>

Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases

Managing Risks in Digital Transformation: Navigate the...

Author: Ashish Kumar ,  Shashank Kumar
ISBN: 9781803246512
Format: Paperback
$92.37

Secure your business in a post-pandemic world: Master digital risk identification and defense Purchase of the print...  Read More >>

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

Tactical Wireshark: A Deep Dive into Intrusion Analysis,...

Author: Kevin Cardwell
ISBN: 9781484292907
Format: Paperback
$171.57

 Read More >>

Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems: ICCCES 2022

Proceedings of Fourth International Conference on Communication,...

Author: V. Bindhu ,  João Manuel R. S. Tavares
ISBN: 9789811977527
Format: Hardback
$646.85

This book includes high-quality research papers presented at the Fourth International Conference on Communication,...  Read More >>

The Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness

The Human Fix to Human Risk: 5 Steps to Fostering a...

Author: Lise Lapointe
ISBN: 9781544540443
Format: Paperback
$81.81

Effective cyber security strategy requires creating a culture of security awareness. As remote work and new technologies...  Read More >>

Mastering C++ Network Automation: Run Automation across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking

Mastering C++ Network Automation: Run Automation across...

Author: Justin Barbara
ISBN: 9788196228569
Format: Paperback
$158.37

50+ Sample Automation Programs across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking...  Read More >>

Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter

Mastering Go Network Automation: Automating Networks,...

Author: Ian Taylor
ISBN: 9788196228545
Format: Paperback
$158.37

"""Mastering Go Network Administration"" is a structured beginning for network administrators looking to improve...  Read More >>

Recent Innovations in Computing: Proceedings of ICRIC 2021, Volume 1

Recent Innovations in Computing: Proceedings of ICRIC...

Author: Pradeep Kumar Singh ,  Yashwant Singh
ISBN: 9789811682506
Format: Paperback
$517.47

This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing...  Read More >>

Behavioral Game Theory Analysis of Cybersecurity With Deception and Ids

Behavioral Game Theory Analysis of Cybersecurity With...

Author: Palvi Aggarwal
ISBN: 9785288350108
Format: Paperback
$81.81

"""Behavioral Game Theory Analysis of Cybersecurity With Deception and IDS"" presents a comprehensive study of cybersecurity...  Read More >>

Behavior-based Authentication to Protect System Services From Malicious Attacks

Behavior-based Authentication to Protect System Services...

Author: K Muthumanickam
ISBN: 9783771039349
Format: Paperback
$81.81

Behavior-based authentication is a relatively new approach that has gained traction in recent years for protecting...  Read More >>

Security and Privacy in Federated Learning

Security and Privacy in Federated Learning

Author: Shui Yu ,  Lei Cui
ISBN: 9789811986918
Format: Hardback
$362.22

The book offers an essential overview for researchers who are new to the field, while also equipping them to explore...  Read More >>

Some Security Investigations on Smartphone Platform

Some Security Investigations on Smartphone Platform...

Author: Sumit Kumar
ISBN: 9781805252481
Format: Paperback
$113.52

"In today's world, smartphones have become an integral part of our lives, and we use them for various purposes such...  Read More >>

(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide, 3rd Edition

(Isc)2 Ccsp Certified Cloud Security Professional Official...

Author: Mike Chapple ,  David Seidl
ISBN: 9798212418898
Format: Audio
$92.37

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for...  Read More >>

(Isc)2 Ccsp Certified Cloud Security Professional Official Study Guide, 3rd Edition

(Isc)2 Ccsp Certified Cloud Security Professional Official...

Author: Mike Chapple ,  David Seidl
ISBN: 9798212418881
Format: Audio
$92.37

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for...  Read More >>

Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us

Cybersecurity Myths and Misconceptions: Avoiding the...

Author: Eugene Spafford ,  Leigh Metcalf
ISBN: 9780137929238
Format: Paperback
$105.57

It's been 50 years since the discipline of cybersecurity originated, but users and developers still spread and succumb...  Read More >>

Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List