Ask our staff anything about our shop or products, or leave your feedback.
Hacking, espionage, war and cybercrime as you've never read about them before
Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the ...
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to ...
Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins ...
The first expert discussion of the foundations of cybersecurity
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at ...
A practical roadmap to protecting against cyberattacks in industrial environments
In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security ...
Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted ...
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks
Fighting Phishing: Everything You Can Do To Fight Social Engineering and ...
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization
In See Yourself in Cyber: Security Careers Beyond Hacking, information security ...
Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color ...
Embrace emerging AI trends and integrate your operations with cutting-edge solutions
Enterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ...
Distinguish yourself by becoming a certified AWS Cloud Practitioner
In the newly revised second edition of AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C02) Exam ...
This practical guide to building embedded and IoT devices securely is an essential resource for current and future developers tasked with protecting users from the ...
An intuitive, fully illustrated guide to Amazon Web Services for the visually oriented
In The Illustrated AWS Cloud: A Guide to Help You On Your ...
A must-read guide to a new and rapidly growing field in cybersecurity
In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO ...