Ask our staff anything about our shop or products, or share your feedback.
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks ...
Get the know-how you need to safeguard your data against cyber attacks
Cybercriminals are constantly updating their strategies and techniques in search of new ways ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
Think like a hacker to protect your sensitive information
To safeguard your private data from prying eyes, it helps to understand how hackers do what ...
A compelling, first-hand account of the dark web, from its underground ecosystem, to the people responsible for committing data breaches and leaking data, 21st century ...
A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure
Securing Cloud Containers: Building and Running Secure Cloud-Native Applications is a ...
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your ...
Turn raw logs into real intelligence.
Security teams rely on telemetry-the continuous stream of logs, events, metrics, and signals ...
Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it.We are a far ...
The essentials you need to learn about networking-10 books in one!
With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is ...
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a ...
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...