Ask our staff anything about our shop or products, or leave your feedback.
Will your organization be protected the day a quantum computer breaks encryption on the internet?
Computer encryption is vital for protecting users, data, and infrastructure ...
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the ...
A Sybex guide to Windows Security concepts, perfect for IT beginners
Security is one of the most important components to every company's computer network ...
The CEH Cert Guide is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Cert Guide method of ...
The investigator's practical guide for cybercrime evidence identification and collection
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades ...
The real-world guide to defeating hackers and keeping your business secure
Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity-but they fail ...
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
Humankind's efforts to explain the ...
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz!
With Windows 10, organizations can create ...
As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of ...
A practical handbook to cybersecurity for both tech and non-tech professionals
As reports of major data breaches fill the headlines, it has become impossible for ...
My Online Privacy for Seniors is an exceptionally easy and complete guide to protecting your privacy while you take advantage of the extraordinary resources available ...
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware ...
Hackers know everything about us. We know almost nothing about them. Until now.
Hackers know everything about us. We know almost nothing about them. Until ...