Ask our staff anything about our shop or products, or leave your feedback.
Countering flexible and persistent adversaries requires empowered defenders The Active Cyber Defense Cycle empowers cyber defenders to unify their cyber security efforts into a single ...
This up-to-date study bundle contains two books and a digital quick review guide to use in preparation for the CISM exam
Take the 2022 version ...
Immerse yourself in the offensive security mindset to better defend against attacks
In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect ...
Prepare smarter and faster for the LPI Security Essentials exam
In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers ...
Secure your applications with help from your favorite Jedi masters
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator ...
Start your journey to becoming a master hacker with this hands-on guide by the author of the best-selling Linux Basics for Hackers. Learn the tools ...
Design, implement, and integrate a complete data sanitization program
In Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, a well-rounded team ...
Provides 100% coverage of every objective on the 2022 CISM exam
This integrated self-study guide enables you to take the 2022 version of the challenging ...
The gold standard in up-to-date blockchain cybersecurity handbooks
In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and ...
Learn to think like a hacker to secure your own systems and data
Your smartphone, laptop, and desktop computer are more important to your life ...
For coursesin Cryptography, Computer Security, and Network Security.
Keep pacewith the fast-moving field of cryptography and network security
Stallings' Cryptographyand Network Security: Principles and Practice ...
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states.
Cyber attacks are no longer the domain of petty ...
Make security a priority on your team
Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every ...
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers ...
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide As cybersecurity becomes an increasingly mission-critical issue, more and ...