Ask our staff anything about our shop or products, or leave your feedback.
Countering flexible and persistent adversaries requires empowered defenders The Active Cyber Defense Cycle empowers cyber defenders to unify their cyber security efforts into a single ...
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and ...
Cyber Security Engineering: A Foundation for Operational Security will serve as the definitive modern reference and tutorial on the full range of capabilities associated with ...
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods ...
Implement maximum control, security, and compliance processes in Azure cloud environments
In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and ...
Combines the popular Sybex CEH v9: Certified Ethical Hacker Version 9 Study Guide ISBN 978-1-119-25224-5 updated for the CEH v9 exam with the all new ...
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to ...
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and ...
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry ...
Technologies and Control Technologies and Control
Master CEH v9 and identify your weak spots
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five ...
The ultimate preparation guide for the unique CEH exam.
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH ...