Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box...
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as...
Practical Lock Picking: A Physical Penetration Testers Training Guide Introduces The Reader To The Basic Principles Of Lock Picking. The Book Combines Both Easytofollow, Stepbystep...
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testingthe act of testing a computer...
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.The "Heartbleed" vulnerability has...
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft...
SQL server is the most widelyused database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer...
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive...
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your companys secrets....
Security Risk Management Is The Definitive Guide For Building Or Running An Information Security Risk Management Program. This Book Teaches Practical Techniques That Will Be...
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be...
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on...
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award'SQL injection is probably the number one problem for any serverside...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":null,"requiresBillingAgreement":false,"merchantId":"TFGLCKQ7YEVTA","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AfUEYT7nO4BwZQERn9Vym5TbHAG08ptiKa9gm8OARBYgoqiAJIjllRjeIMI4g294KAH1JdTnkzubt1fr\u0026merchant-id=TFGLCKQ7YEVTA\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="f7f318540f4349e02df154411d70af92" enabled-flags="["1b55bc27","2d75a54c"]" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box...
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as...
Practical Lock Picking: A Physical Penetration Testers Training Guide Introduces The Reader To The Basic Principles Of Lock Picking. The Book Combines Both Easytofollow, Stepbystep...
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testingthe act of testing a computer...
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.The "Heartbleed" vulnerability has...
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft...
SQL server is the most widelyused database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer...
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive...
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your companys secrets....
Security Risk Management Is The Definitive Guide For Building Or Running An Information Security Risk Management Program. This Book Teaches Practical Techniques That Will Be...
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be...
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on...
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award'SQL injection is probably the number one problem for any serverside...
Sale price$30.37Regular price$43.39
Quantity
Add to cart
Recently viewed products
Choosing a selection results in a full page refresh.