Ask our staff anything about our shop or products, or leave your feedback.
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux ...
An easy-to-read guide to protecting your digital life and your family online
The rise of new technologies in our lives, which has taken us from ...
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research ...
The perfect introduction to pen testing for all IT professionals and students
Welcome to today's most useful and practical introduction to penetration testing. Chuck ...
This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create ...
Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities ...
Enterprise and service provider networks are increasingly adopting SIP as the guiding protocol for session management, and require leveraging Session Border Controller (SBC) technology to ...
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Malware Data Science explains how to identify ...
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows, step by step, how to design and deploy highly secure systems ...
Discover powerful new techniques for securing both current and new IoT systems
Leverage SDN, NFV, fog and cloud compute concepts and architectures to deliver unprecedented ...
This book presents comprehensive Azure Security Center etechniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas ...
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this ...
Using cloud and hybrid cloud computing services, you can transform your data center to serve dynamic, highly-changeable workloads, process and analyse soaring data loads, and ...
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader ...
The IT pro's must-have guide to Windows Server 2016 Mastering Windows Server 2016 is a complete resource for IT professionals needing to get quickly ...