Ask our staff anything about our shop or products, or leave your feedback.
Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure ...
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to ...
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is ...
Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking ...
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux ...
For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his ...
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and ...
Cyber Security Engineering: A Foundation for Operational Security will serve as the definitive modern reference and tutorial on the full range of capabilities associated with ...
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods ...
Implement maximum control, security, and compliance processes in Azure cloud environments
In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and ...
Combines the popular Sybex CEH v9: Certified Ethical Hacker Version 9 Study Guide ISBN 978-1-119-25224-5 updated for the CEH v9 exam with the all new ...
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to ...
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and ...
Technologies and Control Technologies and Control
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry ...