Ask our staff anything about our shop or products, or leave your feedback.
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado ...
Appropriate for all graduate-level and upper-level courses in network or computer security.
Widely regarded as the most comprehensive yet comprehensible guide to network security, the ...
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ...
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You ...
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for ...
We need to re-think our security paradigm from the long-standing one of trying to keep bad guys out of our networks to assuming that they ...
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial ...
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of ...
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation ...
Assess your readiness for the CISSP Exam-and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips ...
Your 2-in-1 Self-Paced Training Kit
EXAM PREP GUIDE
Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through ...
A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
If you're preparing for the new CompTIA 2006 certification in A plus, or the current Network plus and Security plus certifications, you'll find ...