Ask our staff anything about our shop or products, or share your feedback.
No extra details available for this item.
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.
Get ...
Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to ...
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the ...
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a ...
Make your next Amazon Web Services deployment secure and private
Dive into the world of cloud security with Securing the AWS Cloud: A Guide for ...
A start-to-finish guide for realistically measuring cybersecurity risk
In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security ...
Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it.We are a far ...
If you think that your small or medium-sized business isn't a target for cybercrime, think again - the majority of cyberattacks are against SMEs.
Secure ...
A transformative new approach to Internet security from an experienced industry expert
Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a ...
Get the know-how you need to safeguard your data against cyber attacks
Cybercriminals are constantly updating their strategies and techniques in search of new ways ...
A no-fluff guide to implementing best practices for securing cloud native services.
What ...