Filter
(found 1689 products)
Book cover image
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these ...
Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. * Learn security and surveillance fundamentals * Secure and protect remote access and devices * Understand network topologies, protocols, and strategies * Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
https://magrudy-assets.storage.googleapis.com/9781119362395.jpg
42.000000 USD

Cybersecurity Essentials

by Donald D. Short, Philip Craig, Charles J Brooks
Paperback / softback
Book cover image
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the ...
Compressed Sensing for Privacy-Preserving Data Processing
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors' website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.
https://magrudy-assets.storage.googleapis.com/9789811322785.jpg
73.490000 USD

Compressed Sensing for Privacy-Preserving Data Processing

by Enrico Magli, Tiziano Bianchi, Diego Valsesia, Matteo Testa
Paperback / softback
Book cover image
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book ...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.
https://magrudy-assets.storage.googleapis.com/9781789344202.jpg
41.990000 USD

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

by Joseph Marshall
Paperback / softback
Book cover image
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book DescriptionThe tech world has been taken over by digitization to ...
Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book DescriptionThe tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. What you will learn Develop a cost-effective end-to-end vulnerability management program Implement a vulnerability management program from a governance perspective Learn about various standards and frameworks for vulnerability assessments and penetration testing Understand penetration testing with practical learning on various supporting tools and techniques Gain insight into vulnerability scoring and reporting Explore the importance of patching and security hardening Develop metrics to measure the success of the vulnerability management program Who this book is forNetwork Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.
https://magrudy-assets.storage.googleapis.com/9781788627252.jpg
41.990000 USD

Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure

by Sagar Rahalkar
Paperback / softback
Book cover image
This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success ...
Digital Transformation: Challenges and Opportunities: 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers
This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017. The purpose of WeB is to provide an open forum for e-Business researchers and practitioners world-wide, to share topical research findings, explore novel ideas, discuss success stories and lessons learned, map out major challenges, and collectively chart future directions for e-Business. The WeB 2017 theme was Digital transformation: challenges and opportunities . The 11 papers presented in this volume were carefully reviewed and selected from 43 submissions. These are original research articles with a broad coverage of behavioral issues on consumers, citizens, businesses, industries and governments, ranging from technical to strategic issues.
https://magrudy-assets.storage.googleapis.com/9783319999357.jpg
62.990000 USD

Digital Transformation: Challenges and Opportunities: 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers

Paperback / softback
Book cover image
Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and litigation in cyber security law: can you provide a defensive shield? Cyber Security: Law and Guidance provides an overview of legal developments in cyber security and data protection in the European Union and the United ...
Cyber Security: Law and Guidance
Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and litigation in cyber security law: can you provide a defensive shield? Cyber Security: Law and Guidance provides an overview of legal developments in cyber security and data protection in the European Union and the United Kingdom, focusing on the key cyber security laws and related legal instruments, including those for data protection and payment services. Additional context is provided through insight into how the law is developed outside the regulatory frameworks, referencing the `Consensus of Professional Opinion' on cyber security, case law and the role of professional and industry standards for security. With cyber security law destined to become heavily contentious, upholding a robust security framework will become an advantage and organisations will require expert assistance to operationalise matters. Practical in approach, this comprehensive text will be invaluable for legal practitioners and organisations. It covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics include: - Threats and vulnerabilities - Privacy and security in the workplace and built environment - Importance of policy and guidance in digital communications - Industry specialists' in-depth reports - Social media and cyber security - International law and interaction between states - Data security and classification - Protecting organisations - Cyber security: cause and cure
https://magrudy-assets.storage.googleapis.com/9781526505866.jpg
173.250000 USD
Paperback / softback
Book cover image
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. ...
Location Privacy in Mobile Applications
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.
https://magrudy-assets.storage.googleapis.com/9789811317040.jpg
73.490000 USD

Location Privacy in Mobile Applications

by Kun Wang, Yong Xiang, Tianqing Zhu, Wanlei Zhou, Bo Liu
Paperback / softback
Book cover image
Act now and get savvy to ensure your kids can enjoy the best of the internet and social media - without the risks. This practical go-to guide explains all the digital dangers kids face when they visit chat rooms, share selfies, use apps, and explore the internet. Worried about what ...
Parent Alert How To Keep Your Kids Safe Online
Act now and get savvy to ensure your kids can enjoy the best of the internet and social media - without the risks. This practical go-to guide explains all the digital dangers kids face when they visit chat rooms, share selfies, use apps, and explore the internet. Worried about what their own teenagers get up to, best friends Nadia Sawalha and Kaye Adams team up with international security expert Will Geddes. They ask the questions, and Will gives the answers, with simple action plans, preventative steps, and advice on how to recognise the warning signs. Your child's experiences online can potentially impact them for many years to come. Learn how to avoid internet dangers and help them stay safe online.
https://magrudy-assets.storage.googleapis.com/9780241350706.jpg
25.20 USD

Parent Alert How To Keep Your Kids Safe Online

by Kaye Adams, Nadia Sawalha, Will Geddes
Paperback / softback
Book cover image
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to ...
Social Engineering: The Science of Human Hacking
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the system in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
https://magrudy-assets.storage.googleapis.com/9781119433385.jpg
46.05 USD

Social Engineering: The Science of Human Hacking

by Christopher Hadnagy
Paperback / softback
Book cover image
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They ...
Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections such as Web Services, RESTful web services, Web Services Description Langugage, Universal Description Discovery and Integration, Service discovery and interfaces, Domain-specific security and privacy architectures, Location bases services, Sercurity Services and Markup languages.
https://magrudy-assets.storage.googleapis.com/9783319942889.jpg
104.990000 USD

Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback / softback
Book cover image
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections ...
Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.
https://magrudy-assets.storage.googleapis.com/9789811086564.jpg
157.490000 USD

Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I

Paperback / softback
Book cover image
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections ...
Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.
https://magrudy-assets.storage.googleapis.com/9789811086595.jpg
157.490000 USD

Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II

Paperback / softback
Book cover image
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning ...
Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788839235.jpg
41.990000 USD

Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus

by Ajay Singh Chauhan
Paperback / softback
Book cover image
Stuff I Will Not Forget!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)
https://magrudy-assets.storage.googleapis.com/9781725921573.jpg
7.340000 USD

Stuff I Will Not Forget!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Organizer Alphabetical: Red Cover, Small Size, 5x8, 110 Page ( 55 Sheets), Alphabetical Tap Inside Star Shape for Over 300 User and Password, Keep Your Passcode Pin and Secret Question & Answer, for Men Women, Collect Personal Internet Info in Se
https://magrudy-assets.storage.googleapis.com/9781726303743.jpg
8.350000 USD

Password Organizer Alphabetical: Red Cover, Small Size, 5x8, 110 Page ( 55 Sheets), Alphabetical Tap Inside Star Shape for Over 300 User and Password, Keep Your Passcode Pin and Secret Question & Answer, for Men Women, Collect Personal Internet Info in Se

by Paul K Kani
Paperback / softback
Book cover image
Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)
https://magrudy-assets.storage.googleapis.com/9781725921474.jpg
7.340000 USD

Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Log: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)
https://magrudy-assets.storage.googleapis.com/9781725921405.jpg
7.340000 USD

Password Log: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Internet Password Logbook: Keep Track of Your Username, Password, Web Addresses, Expiry Date, Telephone Number All in One Easy to Carry on with Blank Full Paper of Large Size 8.5*11.5 Inch. Home Log and Plan Organizer with Colorful Butterfly Matte Cover.
https://magrudy-assets.storage.googleapis.com/9781725924451.jpg
5.870000 USD

Internet Password Logbook: Keep Track of Your Username, Password, Web Addresses, Expiry Date, Telephone Number All in One Easy to Carry on with Blank Full Paper of Large Size 8.5*11.5 Inch. Home Log and Plan Organizer with Colorful Butterfly Matte Cover.

by James a Delisiotio
Paperback / softback
Book cover image
Personal User Name Internet Address and Password Book Notebook A-Z Tabs Pocket: Digital Electronic Usernames Journal Diary Notebook Computer Website Secret Passwords with Bank Account Credit Account Email Accounts Section Men Women Teenagers College Perso
https://magrudy-assets.storage.googleapis.com/9781726254427.jpg
7.330000 USD

Personal User Name Internet Address and Password Book Notebook A-Z Tabs Pocket: Digital Electronic Usernames Journal Diary Notebook Computer Website Secret Passwords with Bank Account Credit Account Email Accounts Section Men Women Teenagers College Perso

by Ks Sk
Paperback / softback
Book cover image
For Those Goldfish Moments: A Discreet Internet Password and Address Book for Your Contacts and Websites
https://magrudy-assets.storage.googleapis.com/9781720011736.jpg
8.390000 USD

For Those Goldfish Moments: A Discreet Internet Password and Address Book for Your Contacts and Websites

by Ceri Clark
Paperback / softback
Book cover image
She Believed She'd Remember, So She Did!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)
https://magrudy-assets.storage.googleapis.com/9781725921542.jpg
7.340000 USD

She Believed She'd Remember, So She Did!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Internet Password Book: The Username and Password Book for Women
https://magrudy-assets.storage.googleapis.com/9781726221887.jpg
10.490000 USD

Internet Password Book: The Username and Password Book for Women

by Joanne Jeep
Paperback / softback
Book cover image
Internet Password Journal: Your Online Security and Email Organizer
https://magrudy-assets.storage.googleapis.com/9781726175050.jpg
7.320000 USD

Internet Password Journal: Your Online Security and Email Organizer

by Arabana Memory
Paperback / softback
Book cover image
Password Keeper: A Discreet Keeper for Login Details, Password Manager, Logbook, Alphabetical Organiser
https://magrudy-assets.storage.googleapis.com/9781726052443.jpg
6.290000 USD

Password Keeper: A Discreet Keeper for Login Details, Password Manager, Logbook, Alphabetical Organiser

by Snapping Turtle Books
Paperback / softback
Book cover image
My Password Book: A to Z Log Pages for Storing Passwords and Numbers
https://magrudy-assets.storage.googleapis.com/9781720105527.jpg
9.440000 USD

My Password Book: A to Z Log Pages for Storing Passwords and Numbers

by Shayley Stationery Books
Paperback / softback
Book cover image
My Password Book: A to Z Log Pages for Storing Passwords Codes Usernames
https://magrudy-assets.storage.googleapis.com/9781720102854.jpg
10.490000 USD

My Password Book: A to Z Log Pages for Storing Passwords Codes Usernames

by Shayley Stationery Books
Paperback / softback
Book cover image
Password Logbook: Internet Address and Password Logbook with Tabs A-Z Personalized, Website Organizer, Discreet Password Journal, Password Keeper, Password Book to Organize Logins, 6 X 9 110 Pages (Internet Password Organizer Notebook) (Volume 2)
https://magrudy-assets.storage.googleapis.com/9781726345255.jpg
6.290000 USD

Password Logbook: Internet Address and Password Logbook with Tabs A-Z Personalized, Website Organizer, Discreet Password Journal, Password Keeper, Password Book to Organize Logins, 6 X 9 110 Pages (Internet Password Organizer Notebook) (Volume 2)

by Angel Creations
Paperback / softback
Book cover image
Secret Password Logbook: Collect Personal Internet Info in One Cute Flower Security Internet Log Book, Alphabetical in Star Shape Tab, Over 300 Organized Location of User and Password, Keep Track of Web Addresses in One Location, 5x8, 110 Page, Floral on
https://magrudy-assets.storage.googleapis.com/9781726324892.jpg
8.350000 USD

Secret Password Logbook: Collect Personal Internet Info in One Cute Flower Security Internet Log Book, Alphabetical in Star Shape Tab, Over 300 Organized Location of User and Password, Keep Track of Web Addresses in One Location, 5x8, 110 Page, Floral on

by Paul K Kani
Paperback / softback
Book cover image
Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)
https://magrudy-assets.storage.googleapis.com/9781725921443.jpg
7.340000 USD

Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)

by Notebooks and Journals to Write in
Paperback / softback
Page 1 of 40