Ask our staff anything about our shop or products, or leave your feedback.
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you'll experience their every thought, frustration, and strategic decision-making ...
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs ...
A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst.
Defenders must fully understand ...
An ethical introduction to social engineering, an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a human target ...
Now extensively updated, this authoritative, intensely practical guide to digital forensics draws upon the author's wide-ranging experience in law enforcement, including his pioneering work ...
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.
Dive ...
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and ...
Countering flexible and persistent adversaries requires empowered defenders The Active Cyber Defense Cycle empowers cyber defenders to unify their cyber security efforts into a single ...
Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color ...
Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This ...
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam
Take the 2022 version ...
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
Take the Certified in Cybersecurity exam from (ISC)2 ...
Immerse yourself in the offensive security mindset to better defend against attacks
In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect ...
Prepare smarter and faster for the LPI Security Essentials exam
In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers ...
Secure your applications with help from your favorite Jedi masters
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator ...