Ask our staff anything about our shop or products, or leave your feedback.
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
The first expert discussion of the foundations of cybersecurity
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
Hacking, espionage, war and cybercrime as you've never read about them before
Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the ...
Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted ...
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization
In See Yourself in Cyber: Security Careers Beyond Hacking, information security ...
An intuitive, fully illustrated guide to Amazon Web Services for the visually oriented
In The Illustrated AWS Cloud: A Guide to Help You On Your ...
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android ...
A must-read guide to a new and rapidly growing field in cybersecurity
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO ...
Dramatically lower the cyber risk posed by third-party software and vendors in your organization
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner ...
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions
Information security and personal privacy remains ...
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices
Finding ...
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems ...