Ask our staff anything about our shop or products, or leave your feedback.
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you'll experience their every thought, frustration, and strategic decision-making ...
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks ...
Unlock the potential of Microsoft's powerful web-based collaborative platform that comes standard with Microsoft 365
Microsoft SharePoint unlocks millions of collaborative and remote working ...
Extend your on-premises Windows Server deployments to the cloud with Azure
In Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS, 5-time ...
Design, implement, and integrate a complete data sanitization program
In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team ...
Provides 100% coverage of every objective on the 2022 CISM exam
This integrated self-study guide enables you to take the 2022 version of the challenging ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
The gold standard in up-to-date blockchain cybersecurity handbooks
In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and ...
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs ...
Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted ...
Learn to think like a hacker to secure your own systems and data
Your smartphone, laptop, and desktop computer are more important to your life ...
For coursesin Cryptography, Computer Security, and Network Security.
Keep pacewith the fast-moving field of cryptography and network security
Stallings' Cryptographyand Network Security: Principles and Practice ...
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states.
A practical guide to understanding and analyzing cyber attacks ...
Make security a priority on your team
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every ...
This fully updated four-color textbook is designed for classroom use and covers every topic on the latest version of the challenging CompTIA Network+ exam
Written ...