Ask our staff anything about our shop or products, or leave your feedback.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
DVD Features Three Complete Practice Exams, 31 videos, and 31 Interactive Exercises
Master every topic on CompTIA's new Security+ SY0-401 exam
Assess your knowledge ...
Protect yourself from identity theft! Nearly 17 million Americans were victimized by identity theft in 2012 alone: for 13 straight years, it has been America ...
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is ...
This is a definitive guide to the OAuth 2 protocol. It covers the latest version of the OAuth 2 core specification (currently the spec is ...
This is thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification exam. Fully updated for the CEH v8 exam objectives ...
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and ...
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding ...
Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification ...
Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits-from the bestselling coauthor of the original Hacking Exposed Hacking Exposed Mobile focuses on ...
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable ...
The official, Guidance Software-approved book on the newest EnCE exam! The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation ...
Learn to recognise hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow ...
The definitive guide to information security automation technologies Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP provides IT security managers in both ...