Shop

  • Cyber Risk Leaders: Global C-Suite Insights – Leadership and Influence in the Cyber Age, by Shamane Tan

    AUD $35.00
    Cyber Risk Leaders: Global C-Suite Insights - Leadership and Influence in the Cyber Age’, by Shamane Tan - explores the art of communicating with executives, tips on navigating through corporate challenges, and reveals what the C-Suite looks for in professional partners. For those who are interested in learning from top industry leaders, or an aspiring or current CISO, this book is gold for your career. It’s the go-to book and your CISO kit for the season. E-BOOK NOW AVAILABLE: 
  • The Cyber Breach Communication Playbook

    AUD $39.95
    The Cyber Breach Communications Playbook is set out in a straight-forward, easy to understand format that delivers on equipping Boards with a rapid and competent decision making guideline – “asking the right questions is 80% of getting the right solution.”
  • Network Security

    AUD $159.99
    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.

    André Pérez  ISBN: 978-1-119-04395-9 September 2014 Wiley-ISTE 262 Pages

  • Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct

    AUD $141.00
    This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you’ll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.
  • Security Patterns: Integrating Security and Systems Engineering

    AUD $67.99
    Most security books are targeted at security engineers and specialists. Few show how to build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process.
    • Essential for designers building large-scale systems who want best practice solutions to typical security problems
    • Real world case studies illustrate how to use the patterns in specific domains

      Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad

      ISBN: 978-0-470-85884-4 December 2005 600 Pages
  • Human Security

    AUD $31.99
    There is a real security gap in the world today. Millions of people in regions like the Middle East or East and Central Africa or Central Asia where new wars are taking place live in daily fear of violence. Moreover new wars are increasingly intertwined with other global risks the spread of disease, vulnerability to natural disasters, poverty and homelessness. Yet our security conceptions, drawn from the dominant experience of World War II and based on the use of conventional military force, do not reduce that insecurity; rather they make it worse.This book is an exploration of this security gap. It makes the case for a new approach to security based on a global conversation- a public debate among civil society groups and individuals as well as states and international institutions. The chapters follow on from Kaldors path breaking analysis of the character of new wars in places like the Balkans or Africa during the 1990s. Mary Kaldor. ISBN: 978-0-745-65801-8 May 2013 Polity 240 Pages
  • Cloud Security: A Comprehensive Guide to Secure Cloud Computing

    AUD $57.99
    Well-known security experts decipher the most challenging aspect of cloud computing-security. Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces.
  • Global Security Cultures

    AUD $27.99
    In this book, renowned scholar of war and human security Mary Kaldor introduces the concept of global security cultures in order to explain why we get stuck in particular pathways to security. A global security culture, she explains, involves different combinations of ideas, narratives, rules, people, tools, practices and infrastructure embedded in a specific form of political authority, a set of power relations, that come together to address or engage in large-scale violence. In contrast to the Cold War period, when there was one dominant culture based on military forces and nation-states, nowadays there are competing global security cultures. Defining four main types - geo-politics, new wars, the liberal peace, and the war on terror she investigates how we might identify contradictions, dilemmas and experiments in contemporary security cultures that might ultimately open up new pathways to rescue and safeguard civility in the future. Mary Kaldor, ISBN: 978-1-509-50921-8 May 2018 Polity 224 Pages
  • Cyber-Assurance for the Internet of Things

    AUD $143.99
    This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. Tyson T. Brooks (Editor): ISBN: 978-1-119-19387-6 December 2016 Wiley-IEEE Press 520 Pages
  • Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

    AUD $68.99
    A must-have, hands-on guide for working in the cybersecurity profession. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Thomas J. Mowbray: ISBN: 978-1-118-69704-7 October 2013 360 Pages
  • Liquid Surveillance: A Conversation

    AUD $16.99
    Today the smallest details of our daily lives are tracked and traced more closely than ever before, and those who are monitored often cooperate willingly with the monitors. From London and New York to New Delhi, Shanghai and Rio de Janeiro, video cameras are a familiar and accepted sight in public places. Air travel now commonly involves devices such as body-scanners and biometric checks that have proliferated in the wake of 9/11. And every day Google and credit-card issuers note the details of our habits, concerns and preferences, quietly prompting customized marketing strategies with our active, all too often zealous cooperation. Zygmunt Bauman, David Lyon: ISBN: 978-0-745-66402-6 April 2013 Polity 152 Pages
  • Drones For Dummies

    AUD $28.99
    The fast and easy way to pick out, set up, and learn to fly your drone Ready to soar into the world of unmanned aircraft? Drones For Dummies introduces you to the fascinating world of UAVs. Written in plain English and brimming with friendly instruction,Drones For Dummies provides you with the information you need to find and purchase the right drone for your needs, examples of ways to use a drone, and even drone etiquette and the laws and regulations governing consumer drone usage. Plus, you'll discover the basics of flight, including how to use a drone to capture photos and video. Mark LaFay: ISBN: 978-1-119-04977-7 June 2015 288 Pages