Ask our staff anything about our shop or products, or leave your feedback.
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado ...
Appropriate for all graduate-level and upper-level courses in network or computer security.
Widely regarded as the most comprehensive yet comprehensible guide to network security, the ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough when a hack ...
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You ...
If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide ...
Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive ...
Security Smarts for the Self-Guided IT Professional. You can find out how to excel in the field of computer forensics investigations. You can learn what ...
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets monitoring as a continuous process aimed at extraction of ...
Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's ...
If you're preparing for the new CompTIA 2006 certification in A plus, or the current Network plus and Security plus certifications, you'll find ...
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ...
Plan, design, and deploy Forefront United Access (UAG) with insights straight from the Forefront team at Microsoft. Forefront Unified Access Gateway (UAG)--the evolution of ...
A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty ...