Ask our staff anything about our shop or products, or leave your feedback.
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam
Take the 2022 version ...
Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This ...
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
Take the Certified in Cybersecurity exam from (ISC)2 ...
Immerse yourself in the offensive security mindset to better defend against attacks
In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect ...
Prepare smarter and faster for the LPI Security Essentials exam
In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers ...
Secure your applications with help from your favorite Jedi masters
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator ...
Prep for the SC-100 exam like a pro with Sybex' latest Study Guide
In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 ...
Start your journey to becoming a master hacker with this hands-on guide by the author of the best-selling Linux Basics for Hackers. Learn the tools ...
Extend your on-premises Windows Server deployments to the cloud with Azure
In Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS, 5-time ...
Design, implement, and integrate a complete data sanitization program
In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team ...
Provides 100% coverage of every objective on the 2022 CISM exam
This integrated self-study guide enables you to take the 2022 version of the challenging ...
The gold standard in up-to-date blockchain cybersecurity handbooks
In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and ...
Learn to think like a hacker to secure your own systems and data
Your smartphone, laptop, and desktop computer are more important to your life ...
For coursesin Cryptography, Computer Security, and Network Security.
Keep pacewith the fast-moving field of cryptography and network security
Stallings' Cryptographyand Network Security: Principles and Practice ...
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states.
Cyber attacks are no longer the domain of petty ...