Ask our staff anything about our shop or products, or leave your feedback.
Learn, prepare, and practice for CompTIA Advanced Security Practitioner (CASP) CAS-003 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader ...
MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where ...
Cryptography is hard but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The ...
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux ...
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager ...
Attacking Network Protocolsis a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks ...
Thousands of organizations are recognizing the crucial role of penetration testing in protecting their networks and digital assets. In some industries, "pentesting" is now an ...
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how ...
This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA ...
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of ...
Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access to your networks in a Bring Your ...
Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure ...
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to ...
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is ...
Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking ...