Ask our staff anything about our shop or products, or leave your feedback.
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS
For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence.
Unlike most other ...
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners ...
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming ...
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward ...
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado ...
Appropriate for all graduate-level and upper-level courses in network or computer security.
Widely regarded as the most comprehensive yet comprehensible guide to network security, the ...
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ...
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You ...
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees ...
Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics ...
Good security shouldn't hinder your ability to build and deploy high-quality software, or compromise its unique feature set. This practical guide - written by professionals ...
Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of ...
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ...