Ask our staff anything about our shop or products, or leave your feedback.
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins ...
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
Your ultimate one-stop networking reference
Designed to replace that groaning shelf-load of dull networking books you'd otherwise have to buy and house, Networking All-in-One ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
The new and improved guide to penetration testing using the legendary Metasploit Framework.
The new and improved guide to penetration testing using the legendary Metasploit ...
The essentials you need to learn about networking-10 books in one!
With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is ...
A hands-on, beginner-friendly intro to web application pentesting
In A Beginner's Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a ...
Learn to navigate a world of deepfakes, phishing attacks, and other cybersecurity threats emanating from generative artificial intelligence
In an era where artificial intelligence can ...
A top-to-bottom discussion of website bot attacks and how to defend against them
In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on ...
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the ...
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management
Organizations spend tremendous time and resources addressing ...
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks
Fighting Phishing: Everything You Can Do To Fight Social Engineering and ...
Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This ...
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
Take the Certified in Cybersecurity exam from (ISC)2 ...
The first expert discussion of the foundations of cybersecurity
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at ...