Ask our staff anything about our shop or products, or leave your feedback.
A top-to-bottom discussion of website bot attacks and how to defend against them
In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on ...
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the ...
The first expert discussion of the foundations of cybersecurity
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at ...
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins ...
Hacking, espionage, war and cybercrime as you've never read about them before
Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...
Skillfully deploy Microsoft SharePoint Premium to automate your organization's document processing and management
In Microsoft SharePoint Premium in the Real World: Bringing Practical Cloud ...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing ...
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks
Fighting Phishing: Everything You Can Do To Fight Social Engineering and ...
Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color ...
Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This ...
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.
Get ...
Dramatically lower the cyber risk posed by third-party software and vendors in your organization
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner ...
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
Take the Certified in Cybersecurity exam from (ISC)2 ...