Ask our staff anything about our shop or products, or leave your feedback.
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
A top-to-bottom discussion of website bot attacks and how to defend against them
In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on ...
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the ...
Hacking, espionage, war and cybercrime as you've never read about them before
Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the ...
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing ...
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks
Fighting Phishing: Everything You Can Do To Fight Social Engineering and ...
Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color ...
Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This ...
The new and improved guide to penetration testing using the legendary Metasploit Framework.
The new and improved guide to penetration testing using the legendary Metasploit ...
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam
Take the 2022 version ...
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization
In See Yourself in Cyber: Security Careers Beyond Hacking, information security ...