Ask our staff anything about our shop or products, or leave your feedback.
Dramatically lower the cyber risk posed by third-party software and vendors in your organization
In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner ...
This new self-study system delivers complete coverage of every topic on the Certified in Cybersecurity exam
Take the Certified in Cybersecurity exam from (ISC)2 ...
Your 2-exams-in-1 study guide for the next-gen Windows Server 2022 certification
In MCA Windows Server Hybrid Administrator Complete Study Guide: Exam AZ-800 and Exam AZ-801 ...
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing billions of Arm devices
Finding ...
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions
Information security and personal privacy remains ...
This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You ...
Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam
Take the current version of the challenging CISM exam with ...
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you'll experience their every thought, frustration, and strategic decision-making ...
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs ...
A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst.
Defenders must fully understand ...
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks ...
Unlock the potential of Microsoft's powerful web-based collaborative platform that comes standard with Microsoft 365
Microsoft SharePoint unlocks millions of collaborative and remote working ...
An ethical introduction to social engineering, an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a human target ...
Now extensively updated, this authoritative, intensely practical guide to digital forensics draws upon the author's wide-ranging experience in law enforcement, including his pioneering work ...
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux ...