Ask our staff anything about our shop or products, or leave your feedback.
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ...
Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification ...
Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits-from the bestselling coauthor of the original Hacking Exposed Hacking Exposed Mobile focuses on ...
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees ...
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets monitoring as a continuous process aimed at extraction of ...
The Definitive, Up-to-Date Guide to Digital Forensics The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers ...
We need to re-think our security paradigm from the long-standing one of trying to keep bad guys out of our networks to assuming that they ...