Ask our staff anything about our shop or products, or leave your feedback.
The essentials you need to learn about networking-10 books in one!
With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is ...
Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to ...
Your ultimate one-stop networking reference
Designed to replace that groaning shelf-load of dull networking books you'd otherwise have to buy and house, Networking All-in-One ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem ...
Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it.We are a far ...
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a ...
Hands-on guidance for professionals investigating crimes that include cryptocurrency
In There's No Such Thing as Crypto Crime: An Investigators Guide, accomplished cybersecurity and forensics ...
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
A top-to-bottom discussion of website bot attacks and how to defend against them
In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on ...
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the ...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing ...
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks
Fighting Phishing: Everything You Can Do To Fight Social Engineering and ...
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.
Get ...