Ask our staff anything about our shop or products, or share your feedback.
No extra details available for this item.
A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure
Securing Cloud Containers: Building and Running Secure Cloud-Native Applications is a ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
Make your next Amazon Web Services deployment secure and private
Dive into the world of cloud security with Securing the AWS Cloud: A Guide for ...
Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices
Cyber Defense is a comprehensive ...
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your ...
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.
Learn essential strategies ...
Ctrl+Alt+Chaos is a gripping true crime narrative about the life and crimes of Julius Kivimaki, aka Zeekill, arguably the most hated hacker in ...
Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it.We are a far ...