Ask our staff anything about our shop or products, or leave your feedback.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book ...
An accessible guide to the ideas and technologies underlying such applications as GPS, Google Maps, Pokemon Go, ride-sharing, driverless cars, and drone surveillance.Billions of ...
Do you want to keep your personal data safe from prying eyes?
Do you want to look behind the scenes of major attacks and hacking ...
Target, test, analyze, and report on security vulnerabilities with pen testing
Pen Testing is necessary for companies looking to target, test, analyze, and patch the ...
Will your organization be protected the day a quantum computer breaks encryption on the internet?
Computer encryption is vital for protecting users, data, and infrastructure ...
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the ...
Did you know, 91% of hiring managers consider certification as part of their hiring requirements? IT Professionals who are new to the industry need a ...
A Sybex guide to Windows Security concepts, perfect for IT beginners
Security is one of the most important components to every company's computer network ...
A clear and concise resource on Windows networking, perfect for IT beginners
Did you know that nearly 85% of IT support roles require a good ...
The CEH Cert Guide is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Cert Guide method of ...
The investigator's practical guide for cybercrime evidence identification and collection
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades ...
The real-world guide to defeating hackers and keeping your business secure
Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity-but they fail ...
Today, networks must evolve and scale faster than ever. You can't manage everything by hand anymore: You need to automate relentlessly. YANG, along with ...
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
Humankind's efforts to explain the ...