Security & Privacy

Save 15%
Rishalin Pillay  has over 12 years' cybersecurity experience, and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis.
AuthorRishalin Pillay BindingBook
Save 15%
Weimin Sun  has 20 years' of experience working in the financial industry. He has worked for top-tier investment and commercial banks such as J.P. Morgan, Bank of America, Citibank, and Morgan Stanley, where he also managed large teams for developing IT applications. Weimin has also held corporate titles such as executive director and senior VP in some of these firms. Weimin has in-depth knowledge of the blockchain technology, data science, data architecture, data modeling, and big data platforms.
AuthorWeimin Sun BindingBook
Save 25%
Graham Thompson, CCSK, CCSP, CISSP , is a cloud security trainer and consultant with over 20 years of IT security experience in large enterprises. He works with large enterprises and government agencies implementing and assessing security controls in cloud environments.
AuthorGraham Thompson BindingPaperback
Save 15%
Nipun Jaswal is an International Cyber Security Author and an award-winning IT security researcher with a decade of experience in penetration testing, vulnerability research, surveillance and monitoring solutions, and RF and wireless hacking. He is currently working as an Associate Partner in Lucideus where he is leading services such as red teaming and vulnerability research along with other enterprise customer services.
AuthorNipun Jaswal BindingBook
Save 15%
Sairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research. He is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has assisted and associated with various financial, telecom, and industrial institutions for testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert.
AuthorSairam Jetty BindingBook
Save 15%
Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux
Save 16%
Learn to use PowerShell, Microsoft's scripting language, to automate real-world tasks that IT professionals and system administrators deal with every day.  
AuthorAdam Bertram (Author) BindingPaperback
The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace.
AuthorThe Open Group BindingPaperback
Save 20%
By Fei Hu
In stock
$13479 $10783
Although there are already some books published on Big Data, most of them only cover basic concepts and society impacts and ignore the internal implementation details—making them unsuitable to R&D people. To fill such a need,  Big Data: Storage, Sharing, and Security  examines Big Data management from an R&D perspective. It covers the 3S designs—storage, sharing, and security—through detailed descriptions of Big Data concepts and implementations.  
Author Fei Hu BindingHardcover
Information Security professionals today have to be able to demonstrate their security strategies within clearly demonstrable frameworks, and show how these are driven by their organization's business priorities, derived from sound risk management assessments.
AuthorIACCM BindingPaperback
By Tim Hemel
In stock
  Van Haren Publishing (VHP) publishes about best practices and standards in the field of IT & IT Management, Enterprise Architecture, Business Management and Project Management. We publish worldwide using our widespread international network of distribution partners
AuthorTim Hemel BindingPaperback
Information is the currency of the information age and in many cases is the most valuable asset possessed by an organisation. Information security management is the discipline that focuses on protecting and securing these assets against the threats of natural disasters, fraud and other criminal activity, user error and system failure
AuthorAlan Calder BindingPaperback
Show another 12 products
Product filters
    Show all (59)
    Show all (16)