Ask our staff anything about our shop or products, or leave your feedback.
Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves.
Website security made easy ...
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide presents you with an organised test preparation routine using proven series elements and techniques. 'Do ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book ...
An accessible guide to the ideas and technologies underlying such applications as GPS, Google Maps, Pokemon Go, ride-sharing, driverless cars, and drone surveillance.Billions of ...
Do you want to keep your personal data safe from prying eyes?
Do you want to look behind the scenes of major attacks and hacking ...
Target, test, analyze, and report on security vulnerabilities with pen testing
Pen Testing is necessary for companies looking to target, test, analyze, and patch the ...
Will your organization be protected the day a quantum computer breaks encryption on the internet?
Computer encryption is vital for protecting users, data, and infrastructure ...
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the ...
A Sybex guide to Windows Security concepts, perfect for IT beginners
Security is one of the most important components to every company's computer network ...
The CEH Cert Guide is targeted specifically for CEH exam candidates, matching the CEH exam objectives with the effective and popular Cert Guide method of ...
The investigator's practical guide for cybercrime evidence identification and collection
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades ...
The real-world guide to defeating hackers and keeping your business secure
Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity-but they fail ...
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
Humankind's efforts to explain the ...
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz!
With Windows 10, organizations can create ...