Please turn on your JavaScript for this page to function normally.
CISSP Study Guide, 2nd Edition

The CISSP certification is a globally-recognized, vendor neutral exam for information security professionals. The newest edition of this study guide is aligned to cover all of …

CompTIA Network+ Certification Boxed Set

CompTIA Network+ Certification Boxed Set provides you with a variety of exam-focused, test-prep resources designed to work together as a comprehensive program for self-study. …

Security Automation Essentials

Security Automation Essentials lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline …

The Computer Incident Response Planning Handbook

The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …

Safe C++: How to avoid common mistakes

It’s easy to make lots of programming mistakes in C++. In fact, any program over a few hundred lines is likely to contain bugs. With this book, you’ll learn about …

Seven Databases in Seven Weeks

For years, the popularity of relational databases created by Oracle, Microsoft, and IBM, and of the open source MySQL, PostgreSQL, and SQLite was undisputed. But, in time, …

Hadoop: The Definitive Guide, 3rd Edition

Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …

Introducing Windows Server 2012

Windows Server 2012, currently available as a Release Candidate, brings forward hundreds of new features and enhancements including cloud computing, networking, storage, …

Hacking Exposed 7: Network Security Secrets and Solutions

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The 7th …

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …

CompTIA Security+ Rapid Review

Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …

Think Like a Programmer

The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools