Ask our staff anything about our shop or products, or leave your feedback.
Gain a Deep, Practical Understanding of 5G Technology, Applications, Architecture, Standards, and Ecosystem
The 5G ultra-high-speed wireless communication standard is a major technological leap forward--substantially ...
Cybersecurity for Beginners is an engaging, informal introduction to the field of cybersecurity. Readers learn how attackers operate, as well as how to defend individuals ...
Your ultimate one-stop networking reference
Designed to replace that groaning shelf-load of dull networking books you'd otherwise have to buy and house, Networking All-in-One ...
How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalized attack against a tech ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
The #1 selling Wi-Fi networking reference guide in the world
The CWNA: Certified Wireless Network Administrator Study Guide is the ultimate preparation resource for the ...
Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a ...
Get prepared for the AWS Certified Security Specialty certification with this excellent resource
By earning the AWS Certified Security Specialty certification, IT professionals can gain ...
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic
In ...
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification ...
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and devices.
Written by all-star security ...
Cyberjutsu is an approachable and enlightening guide to modern cyber security and espionage, based on secret techniques shared in ancient Japanese ninja scrolls. Like Sun ...
How companies like Amazon, Netflix, and Spotify know what "you might also like"- the history, technology, business, and societal impact of online recommendation engines.
How ...
Stopping Losses from Accidental and Malicious Actions
Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe ...