Books

Filter
Set Descending Direction

24 Items

per page
  1. Humans and Cyber Security object(Magento\Catalog\Model\Product\Interceptor)#18139 (33) { ["entity_id"]=> string(5) "49543" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781040322598" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:38:15" ["updated_at"]=> string(19) "2025-07-24 06:47:20" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(25) "Humans and Cyber Security" ["image"]=> string(24) "/9/7/9781040322598_1.jpg" ["small_image"]=> string(24) "/9/7/9781040322598_1.jpg" ["thumbnail"]=> string(24) "/9/7/9781040322598_1.jpg" ["image_label"]=> string(25) "Humans and Cyber Security" ["small_image_label"]=> string(25) "Humans and Cyber Security" ["thumbnail_label"]=> string(25) "Humans and Cyber Security" ["url_key"]=> string(25) "humans-and-cyber-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cyber security incidents are often attributed to "e;human error"e;. The discipline of human factors recognises the importance of identifying organisational root causes, rather than focusing on individual actions or behaviours. Humans and Cyber Sec" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "humans-and-cyber-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cyber security incidents are often attributed to "e;human error"e;. The...

    Rating:
    0%
    £19.99
    Add to Wish List
  2. Hacker's Challenge object(Magento\Catalog\Model\Product\Interceptor)#18118 (33) { ["entity_id"]=> string(5) "49683" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228564" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:41:31" ["updated_at"]=> string(19) "2025-07-24 06:50:28" ["price"]=> string(9) "33.300000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "33.300000" ["minimal_price"]=> string(9) "33.300000" ["min_price"]=> string(9) "33.300000" ["max_price"]=> string(9) "33.300000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(18) "Hacker's Challenge" ["image"]=> string(24) "/9/7/9780072228564_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228564_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228564_1.jpg" ["image_label"]=> string(18) "Hacker's Challenge" ["small_image_label"]=> string(18) "Hacker's Challenge" ["thumbnail_label"]=> string(18) "Hacker's Challenge" ["url_key"]=> string(18) "hacker-s-challenge" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Find out if you have what it takes to keep the bad guys out of your" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(23) "hacker-s-challenge.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Publisher's Note: Products purchased from Third Party sellers are not...

    Rating:
    0%
    £33.30
    Add to Wish List
  3. IIS Security object(Magento\Catalog\Model\Product\Interceptor)#18463 (33) { ["entity_id"]=> string(5) "49661" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228274" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:40:59" ["updated_at"]=> string(19) "2025-07-24 06:49:59" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(12) "IIS Security" ["image"]=> string(24) "/9/7/9780072228274_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228274_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228274_1.jpg" ["image_label"]=> string(12) "IIS Security" ["small_image_label"]=> string(12) "IIS Security" ["thumbnail_label"]=> string(12) "IIS Security" ["url_key"]=> string(12) "iis-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restric" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(17) "iis-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Protect your IIS server with help from this authoritative book....

    Rating:
    0%
    £54.90
    Add to Wish List
  4. AI Embedded Assurance for Cyber Systems object(Magento\Catalog\Model\Product\Interceptor)#18167 (27) { ["entity_id"]=> string(5) "50790" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031426377" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 19:02:27" ["updated_at"]=> string(19) "2025-07-24 07:11:12" ["price"]=> string(10) "119.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "119.990000" ["minimal_price"]=> string(10) "119.990000" ["min_price"]=> string(10) "119.990000" ["max_price"]=> string(10) "119.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(39) "AI Embedded Assurance for Cyber Systems" ["image_label"]=> string(39) "AI Embedded Assurance for Cyber Systems" ["url_key"]=> string(39) "ai-embedded-assurance-for-cyber-systems" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the secu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "ai-embedded-assurance-for-cyber-systems.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The rapid growth and reliance on cyber systems have permeated...

    Rating:
    0%
    £119.99
    Add to Wish List
  5. Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition object(Magento\Catalog\Model\Product\Interceptor)#18157 (33) { ["entity_id"]=> string(5) "48923" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071838504" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:24:34" ["updated_at"]=> string(19) "2025-07-24 06:35:01" ["price"]=> string(9) "54.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.000000" ["minimal_price"]=> string(9) "54.000000" ["min_price"]=> string(9) "54.000000" ["max_price"]=> string(9) "54.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(62) "Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition" ["image"]=> string(24) "/9/7/9780071838504_1.jpg" ["small_image"]=> string(24) "/9/7/9780071838504_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780071838504_1.jpg" ["image_label"]=> string(62) "Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition" ["small_image_label"]=> string(62) "Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition" ["thumbnail_label"]=> string(62) "Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition" ["url_key"]=> string(61) "gray-hat-hacking-the-ethical-hacker-s-handbook-fourth-edition" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethica" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(66) "gray-hat-hacking-the-ethical-hacker-s-handbook-fourth-edition.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cutting-edge techniques for finding and fixing critical security flawsFortify your...

    Rating:
    0%
    £54.00
    Add to Wish List
  6. Handbuch für Resilience Engineering object(Magento\Catalog\Model\Product\Interceptor)#18131 (27) { ["entity_id"]=> string(5) "51041" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783384281876" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 19:06:52" ["updated_at"]=> string(19) "2025-07-24 07:15:54" ["price"]=> string(9) "11.660000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "11.660000" ["minimal_price"]=> string(9) "11.660000" ["min_price"]=> string(9) "11.660000" ["max_price"]=> string(9) "11.660000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(37) "Handbuch für Resilience Engineering" ["image_label"]=> string(37) "Handbuch für Resilience Engineering" ["url_key"]=> string(35) "handbuch-fur-resilience-engineering" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(259) ""Handbuch für Resilience Engineering" von Sven Hauser ist ein essentielles Nachschlagewerk, das sowohl fundierte theoretische Grundlagen als auch praktische Lösungen für die Herausforderungen moderner Systemsicherheit bereithält. Dieses Buch deckt eine br" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "handbuch-fur-resilience-engineering.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "Handbuch für Resilience Engineering" von Sven Hauser ist ein essentielles...

    Rating:
    0%
    £11.66
    Add to Wish List
  7. Web Hacking Arsenal object(Magento\Catalog\Model\Product\Interceptor)#18136 (33) { ["entity_id"]=> string(5) "51760" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781040098813" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:23:57" ["updated_at"]=> string(19) "2025-07-24 07:23:57" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(19) "Web Hacking Arsenal" ["image"]=> string(22) "/9/7/9781040098813.jpg" ["small_image"]=> string(22) "/9/7/9781040098813.jpg" ["thumbnail"]=> string(22) "/9/7/9781040098813.jpg" ["image_label"]=> string(19) "Web Hacking Arsenal" ["small_image_label"]=> string(19) "Web Hacking Arsenal" ["thumbnail_label"]=> string(19) "Web Hacking Arsenal" ["url_key"]=> string(19) "web-hacking-arsenal" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This bo" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "web-hacking-arsenal.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In the digital age, where web applications form the crux...

    Rating:
    0%
    £36.99
    Add to Wish List
  8. Google Hacking for Penetration Testers object(Magento\Catalog\Model\Product\Interceptor)#18156 (33) { ["entity_id"]=> string(5) "55312" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478050" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:44:31" ["updated_at"]=> string(19) "2025-07-24 08:54:41" ["price"]=> string(9) "28.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "28.990000" ["minimal_price"]=> string(9) "28.990000" ["min_price"]=> string(9) "28.990000" ["max_price"]=> string(9) "28.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(38) "Google Hacking for Penetration Testers" ["image"]=> string(24) "/9/7/9780080478050_1.jpg" ["small_image"]=> string(24) "/9/7/9780080478050_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080478050_1.jpg" ["image_label"]=> string(38) "Google Hacking for Penetration Testers" ["small_image_label"]=> string(38) "Google Hacking for Penetration Testers" ["thumbnail_label"]=> string(38) "Google Hacking for Penetration Testers" ["url_key"]=> string(38) "google-hacking-for-penetration-testers" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. W" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "google-hacking-for-penetration-testers.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Google, the most popular search engine worldwide, provides web surfers...

    Rating:
    0%
    £28.99
    Add to Wish List
  9. Hack Proofing Windows 2000 Server object(Magento\Catalog\Model\Product\Interceptor)#18155 (33) { ["entity_id"]=> string(5) "55539" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478142" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:51" ["updated_at"]=> string(19) "2025-07-24 08:58:51" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(33) "Hack Proofing Windows 2000 Server" ["image"]=> string(22) "/9/7/9780080478142.jpg" ["small_image"]=> string(22) "/9/7/9780080478142.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478142.jpg" ["image_label"]=> string(33) "Hack Proofing Windows 2000 Server" ["small_image_label"]=> string(33) "Hack Proofing Windows 2000 Server" ["thumbnail_label"]=> string(33) "Hack Proofing Windows 2000 Server" ["url_key"]=> string(33) "hack-proofing-windows-2000-server" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The complete, authoritative guide to protecting your Windows 2000 Network"e;Essential reading for your IT security organization."e; -Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch th" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "hack-proofing-windows-2000-server.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The complete, authoritative guide to protecting your Windows 2000 Network"e;Essential...

    Rating:
    0%
    £31.99
    Add to Wish List
  10. Hack Proofing XML object(Magento\Catalog\Model\Product\Interceptor)#18154 (33) { ["entity_id"]=> string(5) "55540" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478159" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:53" ["updated_at"]=> string(19) "2025-07-24 08:58:53" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(17) "Hack Proofing XML" ["image"]=> string(22) "/9/7/9780080478159.jpg" ["small_image"]=> string(22) "/9/7/9780080478159.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478159.jpg" ["image_label"]=> string(17) "Hack Proofing XML" ["small_image_label"]=> string(17) "Hack Proofing XML" ["thumbnail_label"]=> string(17) "Hack Proofing XML" ["url_key"]=> string(17) "hack-proofing-xml" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "hack-proofing-xml.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £31.99
    Add to Wish List
  11. Hack Proofing Your Web Applications object(Magento\Catalog\Model\Product\Interceptor)#18153 (33) { ["entity_id"]=> string(5) "55538" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478135" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:50" ["updated_at"]=> string(19) "2025-07-24 08:58:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(35) "Hack Proofing Your Web Applications" ["image"]=> string(22) "/9/7/9780080478135.jpg" ["small_image"]=> string(22) "/9/7/9780080478135.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478135.jpg" ["image_label"]=> string(35) "Hack Proofing Your Web Applications" ["small_image_label"]=> string(35) "Hack Proofing Your Web Applications" ["thumbnail_label"]=> string(35) "Hack Proofing Your Web Applications" ["url_key"]=> string(35) "hack-proofing-your-web-applications" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the authors of the bestselling Hack Proofing Your Network!OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applicatio" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "hack-proofing-your-web-applications.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the authors of the bestselling Hack Proofing Your Network!OPEC,...

    Rating:
    0%
    £31.99
    Add to Wish List
  12. Scene of the Cybercrime object(Magento\Catalog\Model\Product\Interceptor)#18152 (33) { ["entity_id"]=> string(5) "56438" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080486994" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:15:46" ["updated_at"]=> string(19) "2025-07-24 09:15:46" ["price"]=> string(9) "34.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "34.990000" ["minimal_price"]=> string(9) "34.990000" ["min_price"]=> string(9) "34.990000" ["max_price"]=> string(9) "34.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(23) "Scene of the Cybercrime" ["image"]=> string(22) "/9/7/9780080486994.jpg" ["small_image"]=> string(22) "/9/7/9780080486994.jpg" ["thumbnail"]=> string(22) "/9/7/9780080486994.jpg" ["image_label"]=> string(23) "Scene of the Cybercrime" ["small_image_label"]=> string(23) "Scene of the Cybercrime" ["thumbnail_label"]=> string(23) "Scene of the Cybercrime" ["url_key"]=> string(23) "scene-of-the-cybercrime" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. Wh" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "scene-of-the-cybercrime.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    When it comes to computer crimes, the criminals got a...

    Rating:
    0%
    £34.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. Scene of the Cybercrime: Computer Forensics Handbook object(Magento\Catalog\Model\Product\Interceptor)#18151 (33) { ["entity_id"]=> string(5) "56169" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480787" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:14" ["updated_at"]=> string(19) "2025-07-24 09:11:14" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["image"]=> string(22) "/9/7/9780080480787.jpg" ["small_image"]=> string(22) "/9/7/9780080480787.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480787.jpg" ["image_label"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["small_image_label"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["thumbnail_label"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["url_key"]=> string(51) "scene-of-the-cybercrime-computer-forensics-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."e; - Hans Christian Kruger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has give" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(56) "scene-of-the-cybercrime-computer-forensics-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;Cybercrime and cyber-terrorism represent a serious challenge to society as...

    Rating:
    0%
    £37.99
    Add to Wish List
  15. Handbook of Computer Crime Investigation object(Magento\Catalog\Model\Product\Interceptor)#18150 (33) { ["entity_id"]=> string(5) "56729" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488905" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:44" ["updated_at"]=> string(19) "2025-07-24 09:21:44" ["price"]=> string(9) "47.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "47.990000" ["minimal_price"]=> string(9) "47.990000" ["min_price"]=> string(9) "47.990000" ["max_price"]=> string(9) "47.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(40) "Handbook of Computer Crime Investigation" ["image"]=> string(22) "/9/7/9780080488905.jpg" ["small_image"]=> string(22) "/9/7/9780080488905.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488905.jpg" ["image_label"]=> string(40) "Handbook of Computer Crime Investigation" ["small_image_label"]=> string(40) "Handbook of Computer Crime Investigation" ["thumbnail_label"]=> string(40) "Handbook of Computer Crime Investigation" ["url_key"]=> string(40) "handbook-of-computer-crime-investigation" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Com" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "handbook-of-computer-crime-investigation.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Following on the success of his introductory text, Digital Evidence...

    Rating:
    0%
    £47.99
    Add to Wish List
  16. Lecture Notes in Computer Science object(Magento\Catalog\Model\Product\Interceptor)#18149 (30) { ["entity_id"]=> string(5) "48450" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783030127862" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 13:04:02" ["updated_at"]=> string(19) "2025-07-24 11:48:53" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(33) "Lecture Notes in Computer Science" ["image"]=> string(18) "/9783030127862.jpg" ["small_image"]=> string(18) "/9783030127862.jpg" ["thumbnail"]=> string(18) "/9783030127862.jpg" ["image_label"]=> string(33) "Lecture Notes in Computer Science" ["url_key"]=> string(33) "lecture-notes-in-computer-science" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Pri" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "lecture-notes-in-computer-science.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book constitutes the thoroughly refereed post-conference proceedings of the...

    Rating:
    0%
    £44.99
    Add to Wish List
  17. Ransomware und Cyber-Erpressung object(Magento\Catalog\Model\Product\Interceptor)#18148 (27) { ["entity_id"]=> string(5) "59291" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783988900463" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:07:17" ["updated_at"]=> string(19) "2025-07-24 12:07:17" ["price"]=> string(9) "21.660000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "21.660000" ["minimal_price"]=> string(9) "21.660000" ["min_price"]=> string(9) "21.660000" ["max_price"]=> string(9) "21.660000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(31) "Ransomware und Cyber-Erpressung" ["image_label"]=> string(31) "Ransomware und Cyber-Erpressung" ["url_key"]=> string(31) "ransomware-und-cyber-erpressung" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(260) "Ransomware und Cyber-Erpressung – Sie können etwas dagegen tun- Sie verstehen, wie Angreifer vorgehen.- Sie lernen, was Sie tun müssen, wenn es Sie erwischt hat.- Sie wissen, welche Maßnahmen Sie ab sofort ergreifen sollten, damit Sie eine Erpressung so g" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "ransomware-und-cyber-erpressung.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Ransomware und Cyber-Erpressung – Sie können etwas dagegen tun- Sie...

    Rating:
    0%
    £21.66
    Add to Wish List
  18. No Tech Hacking object(Magento\Catalog\Model\Product\Interceptor)#18147 (33) { ["entity_id"]=> string(5) "67723" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558752" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:14:42" ["updated_at"]=> string(19) "2025-07-24 15:14:42" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(15) "No Tech Hacking" ["image"]=> string(22) "/9/7/9780080558752.jpg" ["small_image"]=> string(22) "/9/7/9780080558752.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558752.jpg" ["image_label"]=> string(15) "No Tech Hacking" ["small_image_label"]=> string(15) "No Tech Hacking" ["thumbnail_label"]=> string(15) "No Tech Hacking" ["url_key"]=> string(15) "no-tech-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliche goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronical" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(20) "no-tech-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's...

    Rating:
    0%
    £30.99
    Add to Wish List
  19. Hacking Exposed object(Magento\Catalog\Model\Product\Interceptor)#18146 (33) { ["entity_id"]=> string(5) "49519" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072192148" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:40" ["updated_at"]=> string(19) "2025-07-24 06:46:43" ["price"]=> string(9) "39.600000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.600000" ["minimal_price"]=> string(9) "39.600000" ["min_price"]=> string(9) "39.600000" ["max_price"]=> string(9) "39.600000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(15) "Hacking Exposed" ["image"]=> string(24) "/9/7/9780072192148_1.jpg" ["small_image"]=> string(24) "/9/7/9780072192148_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072192148_1.jpg" ["image_label"]=> string(15) "Hacking Exposed" ["small_image_label"]=> string(15) "Hacking Exposed" ["thumbnail_label"]=> string(15) "Hacking Exposed" ["url_key"]=> string(15) "hacking-exposed" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(125) "This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(20) "hacking-exposed.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This one-of-a-kind book provides in-depth expert insight into how hackers...

    Rating:
    0%
    £39.60
    Add to Wish List
  20. All-in-One object(Magento\Catalog\Model\Product\Interceptor)#18145 (33) { ["entity_id"]=> string(5) "48569" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071831550" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 17:41:47" ["updated_at"]=> string(19) "2025-07-24 06:28:07" ["price"]=> string(9) "53.100000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "53.100000" ["minimal_price"]=> string(9) "53.100000" ["min_price"]=> string(9) "53.100000" ["max_price"]=> string(9) "53.100000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(10) "All-in-One" ["image"]=> string(24) "/9/7/9780071831550_2.jpg" ["small_image"]=> string(24) "/9/7/9780071831550_2.jpg" ["thumbnail"]=> string(24) "/9/7/9780071831550_2.jpg" ["image_label"]=> string(10) "All-in-One" ["small_image_label"]=> string(10) "All-in-One" ["thumbnail_label"]=> string(10) "All-in-One" ["url_key"]=> string(10) "all-in-one" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehe" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(15) "all-in-one.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    An all-new exam guide for version 8 of the Computer...

    Rating:
    0%
    £53.10
    Add to Wish List
  21. Hack Proofing Your Identity In The Information Age object(Magento\Catalog\Model\Product\Interceptor)#18144 (33) { ["entity_id"]=> string(5) "55513" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478081" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:20" ["updated_at"]=> string(19) "2025-07-24 08:58:20" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(19) ["name"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["image"]=> string(22) "/9/7/9780080478081.jpg" ["small_image"]=> string(22) "/9/7/9780080478081.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478081.jpg" ["image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["small_image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["thumbnail_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["url_key"]=> string(50) "hack-proofing-your-identity-in-the-information-age" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "hack-proofing-your-identity-in-the-information-age.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Identity-theft is the fastest growing crime in America, affecting approximately...

    Rating:
    0%
    £25.99
    Add to Wish List
  22. Hacking the Code object(Magento\Catalog\Model\Product\Interceptor)#18143 (33) { ["entity_id"]=> string(5) "55545" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478173" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:59:01" ["updated_at"]=> string(19) "2025-07-24 08:59:01" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(20) ["name"]=> string(16) "Hacking the Code" ["image"]=> string(22) "/9/7/9780080478173.jpg" ["small_image"]=> string(22) "/9/7/9780080478173.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478173.jpg" ["image_label"]=> string(16) "Hacking the Code" ["small_image_label"]=> string(16) "Hacking the Code" ["thumbnail_label"]=> string(16) "Hacking the Code" ["url_key"]=> string(16) "hacking-the-code" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "hacking-the-code.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Hacking the Code has over 400 pages of dedicated exploit,...

    Rating:
    0%
    £32.99
    Add to Wish List
  23. Managing Catastrophic Loss of Sensitive Data object(Magento\Catalog\Model\Product\Interceptor)#18132 (33) { ["entity_id"]=> string(5) "67776" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558714" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:07" ["updated_at"]=> string(19) "2025-07-24 15:16:07" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(21) ["name"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["image"]=> string(22) "/9/7/9780080558714.jpg" ["small_image"]=> string(22) "/9/7/9780080558714.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558714.jpg" ["image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["small_image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["thumbnail_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["url_key"]=> string(44) "managing-catastrophic-loss-of-sensitive-data" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadma" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "managing-catastrophic-loss-of-sensitive-data.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Offering a structured approach to handling and recovering from a...

    Rating:
    0%
    £38.99
    Add to Wish List
  24. Seven Deadliest Web Application Attacks object(Magento\Catalog\Model\Product\Interceptor)#18135 (27) { ["entity_id"]=> string(5) "52029" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781597495448" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:49:31" ["updated_at"]=> string(19) "2025-07-24 07:49:31" ["price"]=> string(9) "15.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "15.990000" ["minimal_price"]=> string(9) "15.990000" ["min_price"]=> string(9) "15.990000" ["max_price"]=> string(9) "15.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(22) ["name"]=> string(39) "Seven Deadliest Web Application Attacks" ["image_label"]=> string(39) "Seven Deadliest Web Application Attacks" ["url_key"]=> string(39) "seven-deadliest-web-application-attacks" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out th" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "seven-deadliest-web-application-attacks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Seven Deadliest Web Application Attacks highlights the vagaries of web...

    Rating:
    0%
    £15.99
    Add to Wish List
  25. Hack Proofing Linux object(Magento\Catalog\Model\Product\Interceptor)#18141 (33) { ["entity_id"]=> string(5) "55536" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478111" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:48" ["updated_at"]=> string(19) "2025-07-24 08:58:48" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(23) ["name"]=> string(19) "Hack Proofing Linux" ["image"]=> string(22) "/9/7/9780080478111.jpg" ["small_image"]=> string(22) "/9/7/9780080478111.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478111.jpg" ["image_label"]=> string(19) "Hack Proofing Linux" ["small_image_label"]=> string(19) "Hack Proofing Linux" ["thumbnail_label"]=> string(19) "Hack Proofing Linux" ["url_key"]=> string(19) "hack-proofing-linux" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrator" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "hack-proofing-linux.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the authors of the bestselling E-Mail Virus Protection Handbook!The...

    Rating:
    0%
    £31.99
    Add to Wish List
Filter
Set Descending Direction

24 Items

per page