Ask our staff anything about our shop or products, or leave your feedback.
Thousands of organizations are recognizing the crucial role of penetration testing in protecting their networks and digital assets. In some industries, "pentesting" is now an ...
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how ...
This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA ...
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of ...
Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your ...
Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure ...
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to ...
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is ...
Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking ...
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux ...
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his ...