Ask our staff anything about our shop or products, or leave your feedback.
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks ...
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and ...
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins ...
Protect your organization from scandalously easy-to-hack MFA security "solutions"
Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars ...
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux ...
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...
The new and improved guide to penetration testing using the legendary Metasploit Framework.
The new and improved guide to penetration testing using the legendary Metasploit ...
Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it.We are a far ...
Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This ...
Countering flexible and persistent adversaries requires empowered defenders The Active Cyber Defense Cycle empowers cyber defenders to unify their cyber security efforts into a single ...
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam
Take the 2022 version ...
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization
In See Yourself in Cyber: Security Careers Beyond Hacking, information security ...
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.
Get ...
An intuitive, fully illustrated guide to Amazon Web Services for the visually oriented
In The Illustrated AWS Cloud: A Guide to Help You On Your ...
This groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google's Android Security ...