Ask our staff anything about our shop or products, or leave your feedback.
Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security
Cloud technology has changed the way we approach technology ...
All the essentials for administering Windows Server 2022 in one book Looking for a little help installing, configuring, securing, or running a network running Windows ...
Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the exam
CSSLP Certification All-in-One Exam Guide, Third ...
Master CEH v11 and identify your weak spots
As protecting information continues to be a growing concern for today's businesses, certifications in IT security ...
Avoid becoming the next ransomware victim by taking practical steps today
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished ...
CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five ...
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and ...
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros
In Threat Hunting in the Cloud: Defending AWS ...
As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next level
Key Features
Architect, design, and build ICS ...
An ethical introduction to social engineering, an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a human target ...
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk
Over the last decade, there have been hundreds of big-name organizations in every ...
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack
Cloud Native Security delivers a detailed study into minimizing the attack ...
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers
In The Art of Attack: Attacker ...