Ask our staff anything about our shop or products, or leave your feedback.
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing ...
Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind ever - Windows Registry Forensics provides the background of the ...
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS
For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence.
Unlike most other ...
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners ...
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming ...
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward ...
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado ...
Appropriate for all graduate-level and upper-level courses in network or computer security.
Widely regarded as the most comprehensive yet comprehensible guide to network security, the ...
The Hardware Hacking Handbook is a deep dive into hardware attacks on embedded systems, perfect for anyone interested in designing, analyzing, and attacking devices. You ...
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ...
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for ...
We need to re-think our security paradigm from the long-standing one of trying to keep bad guys out of our networks to assuming that they ...
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial ...
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation ...