Ask our staff anything about our shop or products, or leave your feedback.
An easy-to-read guide to protecting your digital life and your family online
The rise of new technologies in our lives, which has taken us from ...
The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research ...
The perfect introduction to pen testing for all IT professionals and students
Welcome to today's most useful and practical introduction to penetration testing. Chuck ...
This book is a complete guide to establishing a cybersecurity program and governance in your organisation. In this book, you will learn how to create ...
Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities ...
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Malware Data Science explains how to identify ...
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows, step by step, how to design and deploy highly secure systems ...
Discover powerful new techniques for securing both current and new IoT systems
Leverage SDN, NFV, fog and cloud compute concepts and architectures to deliver unprecedented ...
This book presents comprehensive Azure Security Center etechniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas ...
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this ...
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader ...
MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where ...
The latest release in the best-selling Manga Guide series explains how cryptographic ciphers work and how to crack them.
Cryptography is hard, but it's ...
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager ...
Attacking Network Protocolsis a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks ...