Search preferences
Skip to main search results

Search filters

Product Type

  • All Product Types 
  • Books (12)
  • Magazines & Periodicals (No further results match this refinement)
  • Comics (No further results match this refinement)
  • Sheet Music (No further results match this refinement)
  • Art, Prints & Posters (No further results match this refinement)
  • Photographs (No further results match this refinement)
  • Maps (No further results match this refinement)
  • Manuscripts & Paper Collectibles (No further results match this refinement)

Condition Learn more

  • New (12)
  • As New, Fine or Near Fine (No further results match this refinement)
  • Very Good or Good (No further results match this refinement)
  • Fair or Poor (No further results match this refinement)
  • As Described (No further results match this refinement)

Binding

Collectible Attributes

  • First Edition (No further results match this refinement)
  • Signed (No further results match this refinement)
  • Dust Jacket (No further results match this refinement)
  • Seller-Supplied Images (No further results match this refinement)
  • Not Print on Demand (No further results match this refinement)

Language (1)

Price

  • Any Price 
  • Under £ 20 
  • £ 20 to £ 35 (No further results match this refinement)
  • Over £ 35 (No further results match this refinement)
Custom price range (£)

Free Shipping

  • Free Shipping to U.S.A. (No further results match this refinement)

Seller Location

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. The cloud has revolutionized the way we store and manage data, but it also presents a range of security challenges. 'Hacking Secure Cloud Computing' offers a comprehensive guide to securing cloud-based systems and data, from encryption and access control to identity and access management. By examining the latest security protocols and technologies, this book provides readers with the knowledge and skills necessary to protect their cloud-based assets from even the most sophisticated attackers. Whether you're a seasoned IT professional or just starting out, this book is an essential resource for anyone looking to safeguard their organization's digital assets. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. The increasing use of cloud computing has led to a pressing need for secure data storage and transmission. 'Hacking Secure Data in Cloud Computing' presents a comprehensive guide to the art of securing cloud data, a critical tool for protecting against cyber threats. By exploring the latest techniques and methodologies in this field, this book equips cloud developers, security professionals, and network administrators with the knowledge and skills needed to protect their cloud data from cyber attacks. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. Hacking Secure Network Protocols and Firewalls in Cloud Computing is a comprehensive guide to the latest techniques and methodologies for securing cloud-based networks and systems. This book provides a thorough examination of the complex relationships between cloud computing, network protocols, and firewalls, highlighting the challenges and opportunities faced by security professionals in the cloud. By exploring the latest advancements in cloud security, including the use of machine learning and artificial intelligence, readers will gain a deeper understanding of the importance of secure network protocols and firewalls in cloud computing. Through a combination of theoretical foundations and practical applications, Hacking Secure Network Protocols and Firewalls in Cloud Computing offers a unique perspective on the future of cloud security. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. The increasing adoption of cloud computing and IoT technologies has created new vulnerabilities in network security, making it essential for organizations to protect their systems and data. This book provides a comprehensive guide to hacking secure network protocols and firewalls in cloud computing and IoT, covering the latest techniques and tools for identifying and mitigating security threats. The author presents a detailed overview of the key network protocols and firewalls used in cloud computing and IoT, including TCP/IP, DNS, and SSL/TLS. The book also explores the role of penetration testing and vulnerability assessment in identifying security weaknesses and developing effective countermeasures. By offering a thorough understanding of the latest security threats and countermeasures, this book provides a valuable resource for cybersecurity professionals, penetration testers, and security architects. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. In the rapidly evolving landscape of IoT and cloud computing, the security of database systems has become a pressing concern. Hacking Secure Database Systems and Protocols in IoT and Cloud Computing offers a cutting-edge exploration of the latest techniques and strategies for protecting database systems from cyber threats. By examining the vulnerabilities and weaknesses of modern database systems, this authoritative resource presents a comprehensive guide to securing database systems in IoT and cloud computing environments. From the intricacies of encryption and access control to the latest threat detection and response strategies, this book provides a thorough and detailed exploration of the complex challenges facing database security professionals. By mastering the techniques and strategies outlined in this book, database security professionals can ensure the integrity and confidentiality of sensitive data in IoT and cloud computing environments. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. In the era of cloud computing, secure email and messaging protocols are more crucial than ever, as the risks of data breaches and cyber attacks continue to escalate. Hacking Secure Email and Messaging Protocols in Cloud Computing provides a comprehensive examination of the latest hacking techniques and methodologies for compromising secure email and messaging protocols in cloud computing environments. By exploring the vulnerabilities and weaknesses of these protocols, this book equips readers with the knowledge and skills necessary to identify and exploit potential security risks, ensuring the confidentiality, integrity, and availability of sensitive data. From the basics of email and messaging protocols to the advanced techniques of hacking and exploitation, this book covers a wide range of topics, providing readers with a deep understanding of the complex security landscape of cloud computing. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. The increasing adoption of cloud computing and IoT technologies has created new vulnerabilities in database security, making it essential for organizations to protect their sensitive data. This book provides a comprehensive guide to hacking secure database systems and protocols in cloud computing and IoT, covering the latest techniques and tools for identifying and mitigating security threats. The author presents a detailed overview of the key database systems and protocols used in cloud computing and IoT, including relational databases, NoSQL databases, and data encryption. The book also explores the role of penetration testing and vulnerability assessment in identifying security weaknesses and developing effective countermeasures. By offering a thorough understanding of the latest security threats and countermeasures, this book provides a valuable resource for cybersecurity professionals, penetration testers, and security architects. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. As cloud computing continues to grow, the need for secure database systems and protocols has never been greater. Hacking Secure Database Systems and Protocols in Cloud Computing offers a comprehensive examination of the latest techniques and tools used to safeguard cloud-based database systems. By exploring the intricacies of database security, encryption, and authentication, this book empowers readers to protect their cloud-based data from cyber threats. With its in-depth analysis and real-world examples, Hacking Secure Database Systems and Protocols in Cloud Computing is an essential resource for cloud security professionals and database administrators. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. The increasing adoption of IoT and cloud computing technologies has created new vulnerabilities in network security, making it essential for organizations to protect their systems and data. This book provides a comprehensive guide to hacking secure network protocols and firewalls in IoT and cloud computing, covering the latest techniques and tools for identifying and mitigating security threats. The author presents a detailed overview of the key network protocols and firewalls used in IoT and cloud computing, including TCP/IP, DNS, and SSL/TLS. The book also explores the role of penetration testing and vulnerability assessment in identifying security weaknesses and developing effective countermeasures. By offering a thorough understanding of the latest security threats and countermeasures, this book provides a valuable resource for cybersecurity professionals, penetration testers, and security architects. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. Hacking Secure Cloud Computing and Security presents a detailed analysis of the complex relationships between cloud computing and security. By examining the intricacies of cloud security protocols and best practices, readers can develop a deeper understanding of the critical components of secure cloud computing. With a focus on real-world examples and practical applications, this book provides a comprehensive guide for cloud administrators and security professionals. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. The increasing adoption of IoT and cloud computing technologies has created new vulnerabilities in wireless network security, making it essential for organizations to protect their systems and data. This book provides a comprehensive guide to hacking secure wireless networks and protocols in IoT and cloud computing, covering the latest techniques and tools for identifying and mitigating security threats. The author presents a detailed overview of the key wireless network protocols and firewalls used in IoT and cloud computing, including Wi-Fi, Bluetooth, and cellular networks. The book also explores the role of penetration testing and vulnerability assessment in identifying security weaknesses and developing effective countermeasures. By offering a thorough understanding of the latest security threats and countermeasures, this book provides a valuable resource for cybersecurity professionals, penetration testers, and security architects. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.

  • Continental Academy Press

    Published by Continental Academy Press, London

    Seller: Continental Academy Press, London, SELEC, United Kingdom

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    Print on Demand

    £ 7.50 shipping from United Kingdom to U.S.A.

    Destination, rates & speeds

    Quantity: Over 20 available

    Add to basket

    Softcover. Condition: New. Dust Jacket Condition: no dj. First. Hacking Secure Cloud Computing Practices presents a cutting-edge approach to cloud security that emphasizes proactive defense and strategic risk management. By examining the latest threats and trends in the cloud landscape, this book provides a comprehensive guide to identifying and mitigating potential risks. It explores the intersection of cloud security and cybersecurity, revealing the ways in which a proactive approach can drive business success and protect against data breaches. Through a series of engaging case studies and practical exercises, this book provides a roadmap for cloud security professionals who seek to stay ahead of the threat curve. Publication Year: 2025. SHIPPING TERMS - Depending on your location we may ship your book from the following locations: France, United Kingdom, India, Australia, Canada or the USA. This item is printed on demand.