Ask our staff anything about our shop or products, or leave your feedback.
A must-read guide to a new and rapidly growing field in cybersecurity
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO ...
Immerse yourself in the offensive security mindset to better defend against attacks
In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect ...
Hacking, espionage, war and cybercrime as you've never read about them before
Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the ...
Prepare smarter and faster for the LPI Security Essentials exam
In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers ...
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions
Information security and personal privacy remains ...
Secure your applications with help from your favorite Jedi masters
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator ...
Start your journey to becoming a master hacker with this hands-on guide by the author of the best-selling Linux Basics for Hackers. Learn the tools ...
This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You ...
Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam
Take the current version of the challenging CISM exam with ...
Design, implement, and integrate a complete data sanitization program
In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team ...
Provides 100% coverage of every objective on the 2022 CISM exam
This integrated self-study guide enables you to take the 2022 version of the challenging ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
The gold standard in up-to-date blockchain cybersecurity handbooks
In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and ...
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs ...
Learn to think like a hacker to secure your own systems and data
Your smartphone, laptop, and desktop computer are more important to your life ...