Ask our staff anything about our shop or products, or leave your feedback.
Master CEH v11 and identify your weak spots
CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five ...
Avoid becoming the next ransomware victim by taking practical steps today
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished ...
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros
In Threat Hunting in the Cloud: Defending AWS ...
As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next level
Key Features
Architect, design, and build ICS ...
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack
Cloud Native Security delivers a detailed study into minimizing the attack ...
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk
Over the last decade, there have been hundreds of big-name organizations in every ...
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers
In The Art of Attack: Attacker ...
The only official body of knowledge for CCSP-the most popular cloud security credential-fully revised and updated.
Certified Cloud Security Professional (CCSP) certification validates the advanced ...
Cybersecurity for Beginners is an engaging, informal introduction to the field of cybersecurity. Readers learn how attackers operate, as well as how to defend individuals ...
How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalized attack against a tech ...
Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a ...