Ask our staff anything about our shop or products, or share your feedback.
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks ...
A compelling, first-hand account of the dark web, from its underground ecosystem, to the people responsible for committing data breaches and leaking data, 21st century ...
A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure
Securing Cloud Containers: Building and Running Secure Cloud-Native Applications is a ...
Turn raw logs into real intelligence.
Security teams rely on telemetry-the continuous stream of logs, events, metrics, and signals ...
Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it.We are a far ...
A transformative new approach to Internet security from an experienced industry expert
Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a ...
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
Are you at risk of being scammed? Former con artist and bestselling author of Catch Me If You Can Frank Abagnale shows you how to ...
Think like a hacker to protect your sensitive information
To safeguard your private data from prying eyes, it helps to understand how hackers do what ...
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your ...
Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices
Cyber Defense is a comprehensive ...