Ask our staff anything about our shop or products, or share your feedback.
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
A practical and up-to-date roadmap to securing cloud containers on AWS, GCP, and Azure
Securing Cloud Containers: Building and Running Secure Cloud-Native Applications is a ...
Become a SharePoint power user with this quick-and-easy guide to its many features
SharePoint For Dummies is your trusted instruction manual as you learn to ...
A transformative new approach to Internet security from an experienced industry expert
Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a ...
This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem ...
Make your next Amazon Web Services deployment secure and private
Dive into the world of cloud security with Securing the AWS Cloud: A Guide for ...
The essentials you need to learn about networking-10 books in one!
With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is ...
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!
Master the ...
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.
Get ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
Learn essential strategies to streamline and secure your organization's data handling from a cybersecurity expert who has trained military intelligence personnel.
Learn essential strategies ...
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your ...
Practical and theoretical guide to understanding cyber hygiene, equipping readers with the tools to implement and maintain digital security practices
Cyber Defense is a comprehensive ...
Ctrl+Alt+Chaos is a gripping true crime narrative about the life and crimes of Julius Kivimaki, aka Zeekill, arguably the most hated hacker in ...