Ask our staff anything about our shop or products, or leave your feedback.
Attacking Network Protocolsis a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks ...
Thousands of organizations are recognizing the crucial role of penetration testing in protecting their networks and digital assets. In some industries, "pentesting" is now an ...
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how ...
This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA ...
IP multicast is central to today's enterprise and service provider networks. However, the set of technologies and practices surrounding IP multicast has evolved and ...
Ongoing digitisation, along with the risks of digital disruption, mean today's Enterprise businesses are more reliant than ever on their IT Organisations to be ...
This is the most comprehensive and realistic guide to Windows Server 2016 planning, design, prototyping, implementation, migration, administration, and support. Extensively updated, it contains unsurpassed ...
Over 100 recipes to help you leverage PowerShell to automate Windows Server 2016 manual tasks
About This Book
Automate Windows server tasks with the powerful ...
Among the many configuration management tools available, Ansible has some distinct advantagesundefineditundefineds minimal in nature, you donundefinedt need to install anything on your nodes, and ...
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of ...
Over 30 recipes to automate your mission-critical tasks using the new and powerful Microsoft System Center 2016 Orchestrator
Create powerful runbooks for ...
Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your ...
To support future business continuity, growth, and innovation, organizations must transition to IPv6, the next generation protocol for defining how computers communicate over networks. IPv6 ...
Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure ...
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to ...