Ask our staff anything about our shop or products, or leave your feedback.
You will be breached-the only question is whether you'll be ready
A cyber breach could cost your organization millions of dollars-in 2019, the average ...
Study and prepare for the AWS Certified SysOps Administrator Associate (SOA-C01) Exam
You can prepare for test success with AWS Certified SysOps Administrator Practice Tests ...
STUDY, PRACTICE, REVIEW!
Take your learning to the next level with the NEW AWS Certified SysOps Administrator Certification Kit! Includes AWS Certified SysOps Administrator Study ...
The proven Study Guide that prepares you for this new Google Cloud exam
The Google Cloud Certified Professional Data Engineer Study Guide, provides everything you ...
Tribal Knowledge from the Best in Cybersecurity Leadership
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know ...
Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves.
Website security made easy ...
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide presents you with an organised test preparation routine using proven series elements and techniques. 'Do ...
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included ...
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book ...
An accessible guide to the ideas and technologies underlying such applications as GPS, Google Maps, Pokemon Go, ride-sharing, driverless cars, and drone surveillance.Billions of ...
Do you want to keep your personal data safe from prying eyes?
Do you want to look behind the scenes of major attacks and hacking ...
Target, test, analyze, and report on security vulnerabilities with pen testing
Pen Testing is necessary for companies looking to target, test, analyze, and patch the ...
Will your organization be protected the day a quantum computer breaks encryption on the internet?
Computer encryption is vital for protecting users, data, and infrastructure ...
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the ...
A Sybex guide to Windows Security concepts, perfect for IT beginners
Security is one of the most important components to every company's computer network ...