Ask our staff anything about our shop or products, or leave your feedback.
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
Take the Certified in Cybersecurity exam from (ISC)2 ...
Prep for the SC-100 exam like a pro with Sybex' latest Study Guide
In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 ...
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems ...
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you'll experience their every thought, frustration, and strategic decision-making ...
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks ...
Protect your organization from scandalously easy-to-hack MFA security "solutions"
Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars ...
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux ...
The new and improved guide to penetration testing using the legendary Metasploit Framework.
The new and improved guide to penetration testing using the legendary Metasploit ...
Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it.We are a far ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
Unlock the potential of Microsoft's powerful web-based collaborative platform that comes standard with Microsoft 365
Microsoft SharePoint unlocks millions of collaborative and remote working ...
Your ultimate one-stop networking reference
Designed to replace that groaning shelf-load of dull networking books you'd otherwise have to buy and house, Networking All-in-One ...
Countering flexible and persistent adversaries requires empowered defenders The Active Cyber Defense Cycle empowers cyber defenders to unify their cyber security efforts into a single ...
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ...