Ask our staff anything about our shop or products, or leave your feedback.
Hacking, espionage, war and cybercrime as you've never read about them before
Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the ...
Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
A must-read guide to a new and rapidly growing field in cybersecurity
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO ...
Prepare smarter and faster for the LPI Security Essentials exam
In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers ...
The first expert discussion of the foundations of cybersecurity
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at ...
Prep for the SC-100 exam like a pro with Sybex' latest Study Guide
In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 ...
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam
Take the 2022 version ...
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems ...
Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam
Take the current version of the challenging CISM exam with ...
Provides 100% coverage of every objective on the 2022 CISM exam
This integrated self-study guide enables you to take the 2022 version of the challenging ...
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs ...
A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst.
Defenders must fully understand ...
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks ...