Ask our staff anything about our shop or products, or leave your feedback.
No extra details available for this item.
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins ...
The first expert discussion of the foundations of cybersecurity
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at ...
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the ...
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
Take the Certified in Cybersecurity exam from (ISC)2 ...
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux ...
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a ...
Hands-on guidance for professionals investigating crimes that include cryptocurrency
In There's No Such Thing as Crypto Crime: An Investigators Guide, accomplished cybersecurity and forensics ...
The new and improved guide to penetration testing using the legendary Metasploit Framework.
The new and improved guide to penetration testing using the legendary Metasploit ...
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...