Books

Filter
Set Descending Direction

68 Items

per page
  1. Windows(R) XP Professional Security object(Magento\Catalog\Model\Product\Interceptor)#13824 (33) { ["entity_id"]=> string(5) "49535" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072230345" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:38:05" ["updated_at"]=> string(19) "2025-07-24 06:47:08" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(35) "Windows(R) XP Professional Security" ["image"]=> string(24) "/9/7/9780072230345_1.jpg" ["small_image"]=> string(24) "/9/7/9780072230345_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072230345_1.jpg" ["image_label"]=> string(35) "Windows(R) XP Professional Security" ["small_image_label"]=> string(35) "Windows(R) XP Professional Security" ["thumbnail_label"]=> string(35) "Windows(R) XP Professional Security" ["url_key"]=> string(34) "windows-r-xp-professional-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(234) "Get comprehensive coverage of XP Professional security with this definitive and focused resource. Work with firewalls and intrusion detection systems, fully utilize XP's built-in support tools, manage security remotely, and much more." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "windows-r-xp-professional-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Get comprehensive coverage of XP Professional security with this definitive...

    Rating:
    0%
    £54.90
    Add to Wish List
  2. Hacker's Challenge object(Magento\Catalog\Model\Product\Interceptor)#13811 (33) { ["entity_id"]=> string(5) "49683" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228564" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:41:31" ["updated_at"]=> string(19) "2025-07-24 06:50:28" ["price"]=> string(9) "33.300000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "33.300000" ["minimal_price"]=> string(9) "33.300000" ["min_price"]=> string(9) "33.300000" ["max_price"]=> string(9) "33.300000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(18) "Hacker's Challenge" ["image"]=> string(24) "/9/7/9780072228564_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228564_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228564_1.jpg" ["image_label"]=> string(18) "Hacker's Challenge" ["small_image_label"]=> string(18) "Hacker's Challenge" ["thumbnail_label"]=> string(18) "Hacker's Challenge" ["url_key"]=> string(18) "hacker-s-challenge" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Find out if you have what it takes to keep the bad guys out of your" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(23) "hacker-s-challenge.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Publisher's Note: Products purchased from Third Party sellers are not...

    Rating:
    0%
    £33.30
    Add to Wish List
  3. How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware object(Magento\Catalog\Model\Product\Interceptor)#14242 (33) { ["entity_id"]=> string(5) "49727" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072264296" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:42:47" ["updated_at"]=> string(19) "2025-07-24 06:51:33" ["price"]=> string(9) "22.500000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.500000" ["minimal_price"]=> string(9) "22.500000" ["min_price"]=> string(9) "22.500000" ["max_price"]=> string(9) "22.500000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(65) "How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware" ["image"]=> string(24) "/9/7/9780072264296_1.jpg" ["small_image"]=> string(24) "/9/7/9780072264296_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072264296_1.jpg" ["image_label"]=> string(65) "How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware" ["small_image_label"]=> string(65) "How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware" ["thumbnail_label"]=> string(65) "How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware" ["url_key"]=> string(62) "how-to-do-everything-to-fight-spam-viruses-pop-ups-and-spyware" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Swat spam, vanquish viruses, knock down pop-ups, and expose spyware with help from this one-of-a-kind resource. Loaded with insightful advice, practical tips, and trial software, this book-and-CD defense will help you rid your computer of the perils and n" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(67) "how-to-do-everything-to-fight-spam-viruses-pop-ups-and-spyware.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Swat spam, vanquish viruses, knock down pop-ups, and expose spyware...

    Rating:
    0%
    £22.50
    Add to Wish List
  4. How to Do Everything with Windows XP Home Networking object(Magento\Catalog\Model\Product\Interceptor)#13852 (33) { ["entity_id"]=> string(5) "49731" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072264340" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:42:54" ["updated_at"]=> string(19) "2025-07-24 06:51:38" ["price"]=> string(9) "22.500000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.500000" ["minimal_price"]=> string(9) "22.500000" ["min_price"]=> string(9) "22.500000" ["max_price"]=> string(9) "22.500000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(52) "How to Do Everything with Windows XP Home Networking" ["image"]=> string(24) "/9/7/9780072264340_1.jpg" ["small_image"]=> string(24) "/9/7/9780072264340_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072264340_1.jpg" ["image_label"]=> string(52) "How to Do Everything with Windows XP Home Networking" ["small_image_label"]=> string(52) "How to Do Everything with Windows XP Home Networking" ["thumbnail_label"]=> string(52) "How to Do Everything with Windows XP Home Networking" ["url_key"]=> string(52) "how-to-do-everything-with-windows-xp-home-networking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Network the computers and peripheral devices in your home or small office easily with help from this hands-on guide. How to Do Everything with Windows XP Home Networking explains, step-by-step, how to select the best components for your needs, set up a wi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(57) "how-to-do-everything-with-windows-xp-home-networking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Network the computers and peripheral devices in your home or...

    Rating:
    0%
    £22.50
    Add to Wish List
  5. IIS Security object(Magento\Catalog\Model\Product\Interceptor)#13819 (33) { ["entity_id"]=> string(5) "49661" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228274" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:40:59" ["updated_at"]=> string(19) "2025-07-24 06:49:59" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(12) "IIS Security" ["image"]=> string(24) "/9/7/9780072228274_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228274_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228274_1.jpg" ["image_label"]=> string(12) "IIS Security" ["small_image_label"]=> string(12) "IIS Security" ["thumbnail_label"]=> string(12) "IIS Security" ["url_key"]=> string(12) "iis-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restric" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(17) "iis-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Protect your IIS server with help from this authoritative book....

    Rating:
    0%
    £54.90
    Add to Wish List
  6. Advances in Information Security object(Magento\Catalog\Model\Product\Interceptor)#13803 (27) { ["entity_id"]=> string(5) "49853" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031268458" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:45:07" ["updated_at"]=> string(19) "2025-07-24 06:53:55" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(32) "Advances in Information Security" ["image_label"]=> string(32) "Advances in Information Security" ["url_key"]=> string(32) "advances-in-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending org" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "advances-in-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In today's digital transformation environments, a rigorous cybersecurity approach to...

    Rating:
    0%
    £54.99
    Add to Wish List
  7. Big Data Management object(Magento\Catalog\Model\Product\Interceptor)#13806 (27) { ["entity_id"]=> string(5) "49918" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9789811675669" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:46:10" ["updated_at"]=> string(19) "2025-07-24 06:54:56" ["price"]=> string(10) "119.500000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "119.500000" ["minimal_price"]=> string(10) "119.500000" ["min_price"]=> string(10) "119.500000" ["max_price"]=> string(10) "119.500000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(19) "Big Data Management" ["image_label"]=> string(19) "Big Data Management" ["url_key"]=> string(19) "big-data-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "The development of information technology has made it possible to collect large amounts of spatial data on a daily basis. It is of enormous significance when it comes to discovering implicit, non-trivial and potentially valuable information from this spat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "big-data-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The development of information technology has made it possible to...

    Rating:
    0%
    £119.50
    Add to Wish List
  8. Security Education, Awareness and Training object(Magento\Catalog\Model\Product\Interceptor)#13810 (33) { ["entity_id"]=> string(5) "50503" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080455617" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:56:45" ["updated_at"]=> string(19) "2025-07-24 07:05:41" ["price"]=> string(9) "40.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "40.990000" ["minimal_price"]=> string(9) "40.990000" ["min_price"]=> string(9) "40.990000" ["max_price"]=> string(9) "40.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(42) "Security Education, Awareness and Training" ["image"]=> string(24) "/9/7/9780080455617_1.jpg" ["small_image"]=> string(24) "/9/7/9780080455617_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080455617_1.jpg" ["image_label"]=> string(42) "Security Education, Awareness and Training" ["small_image_label"]=> string(42) "Security Education, Awareness and Training" ["thumbnail_label"]=> string(42) "Security Education, Awareness and Training" ["url_key"]=> string(41) "security-education-awareness-and-training" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "security-education-awareness-and-training.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is the only one available on security training...

    Rating:
    0%
    £40.99
    Add to Wish List
  9. Principles of Computer Security Lab Manual, Fourth Edition object(Magento\Catalog\Model\Product\Interceptor)#13842 (33) { ["entity_id"]=> string(5) "48835" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071836562" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:22:35" ["updated_at"]=> string(19) "2025-07-24 06:33:08" ["price"]=> string(9) "57.600000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "57.600000" ["minimal_price"]=> string(9) "57.600000" ["min_price"]=> string(9) "57.600000" ["max_price"]=> string(9) "57.600000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(58) "Principles of Computer Security Lab Manual, Fourth Edition" ["image"]=> string(24) "/9/7/9780071836562_1.jpg" ["small_image"]=> string(24) "/9/7/9780071836562_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780071836562_1.jpg" ["image_label"]=> string(58) "Principles of Computer Security Lab Manual, Fourth Edition" ["small_image_label"]=> string(58) "Principles of Computer Security Lab Manual, Fourth Edition" ["thumbnail_label"]=> string(58) "Principles of Computer Security Lab Manual, Fourth Edition" ["url_key"]=> string(57) "principles-of-computer-security-lab-manual-fourth-edition" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Practice the Computer Security Skills You Need to Succeed!40+ lab exercises challenge you to solve problems based on realistic case studiesStep-by-step scenarios require you to think criticallyLab analysis tests measure your understanding of lab resultsKe" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(62) "principles-of-computer-security-lab-manual-fourth-edition.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Practice the Computer Security Skills You Need to Succeed!40+ lab...

    Rating:
    0%
    £57.60
    Add to Wish List
  10. Securing Blockchain Networks like Ethereum and Hyperledger Fabric object(Magento\Catalog\Model\Product\Interceptor)#13841 (27) { ["entity_id"]=> string(5) "52835" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781838646455" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:02:51" ["updated_at"]=> string(19) "2025-07-24 08:02:51" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(65) "Securing Blockchain Networks like Ethereum and Hyperledger Fabric" ["image_label"]=> string(65) "Securing Blockchain Networks like Ethereum and Hyperledger Fabric" ["url_key"]=> string(65) "securing-blockchain-networks-like-ethereum-and-hyperledger-fabric" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey FeaturesExplore blockchain concepts such as cryptography, consensus algorithms, and securit" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(70) "securing-blockchain-networks-like-ethereum-and-hyperledger-fabric.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Build secure private blockchain networks to handle mission-critical security challenges...

    Rating:
    0%
    £25.99
    Add to Wish List
  11. Cryptography and Embedded Systems Security object(Magento\Catalog\Model\Product\Interceptor)#13840 (27) { ["entity_id"]=> string(5) "52942" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031622052" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:04:35" ["updated_at"]=> string(19) "2025-07-24 08:04:35" ["price"]=> string(9) "89.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "89.990000" ["minimal_price"]=> string(9) "89.990000" ["min_price"]=> string(9) "89.990000" ["max_price"]=> string(9) "89.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(42) "Cryptography and Embedded Systems Security" ["image_label"]=> string(42) "Cryptography and Embedded Systems Security" ["url_key"]=> string(42) "cryptography-and-embedded-systems-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(47) "cryptography-and-embedded-systems-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This textbook provides an all-in-one approach for learning about hardware...

    Rating:
    0%
    £89.99
    Add to Wish List
  12. Multimedia Security Technologies for Digital Rights Management object(Magento\Catalog\Model\Product\Interceptor)#13839 (33) { ["entity_id"]=> string(5) "52217" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080463896" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:52:22" ["updated_at"]=> string(19) "2025-07-24 07:52:22" ["price"]=> string(9) "64.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "64.990000" ["minimal_price"]=> string(9) "64.990000" ["min_price"]=> string(9) "64.990000" ["max_price"]=> string(9) "64.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["image"]=> string(22) "/9/7/9780080463896.jpg" ["small_image"]=> string(22) "/9/7/9780080463896.jpg" ["thumbnail"]=> string(22) "/9/7/9780080463896.jpg" ["image_label"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["small_image_label"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["thumbnail_label"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["url_key"]=> string(62) "multimedia-security-technologies-for-digital-rights-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and pro" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(67) "multimedia-security-technologies-for-digital-rights-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Security is a major concern in an increasingly multimedia-defined universe...

    Rating:
    0%
    £64.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. Cisco Security Professional's Guide to Secure Intrusion Detection Systems object(Magento\Catalog\Model\Product\Interceptor)#13838 (33) { ["entity_id"]=> string(5) "55232" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476544" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:53" ["updated_at"]=> string(19) "2025-07-24 08:42:53" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["image"]=> string(22) "/9/7/9780080476544.jpg" ["small_image"]=> string(22) "/9/7/9780080476544.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476544.jpg" ["image_label"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["small_image_label"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["thumbnail_label"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["url_key"]=> string(73) "cisco-security-professional-s-guide-to-secure-intrusion-detection-systems" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Profes" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(78) "cisco-security-professional-s-guide-to-secure-intrusion-detection-systems.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cisco Systems, Inc. is the worldwide leader in networking for...

    Rating:
    0%
    £36.99
    Add to Wish List
  15. Best Damn Firewall Book Period object(Magento\Catalog\Model\Product\Interceptor)#13837 (33) { ["entity_id"]=> string(5) "55080" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476063" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:40:17" ["updated_at"]=> string(19) "2025-07-24 08:40:17" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(30) "Best Damn Firewall Book Period" ["image"]=> string(22) "/9/7/9780080476063.jpg" ["small_image"]=> string(22) "/9/7/9780080476063.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476063.jpg" ["image_label"]=> string(30) "Best Damn Firewall Book Period" ["small_image_label"]=> string(30) "Best Damn Firewall Book Period" ["thumbnail_label"]=> string(30) "Best Damn Firewall Book Period" ["url_key"]=> string(30) "best-damn-firewall-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall produ" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "best-damn-firewall-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is essential reading for anyone wanting to protect...

    Rating:
    0%
    £37.99
    Add to Wish List
  16. Building DMZs For Enterprise Networks object(Magento\Catalog\Model\Product\Interceptor)#13836 (33) { ["entity_id"]=> string(5) "55162" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476261" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:47" ["updated_at"]=> string(19) "2025-07-24 08:41:47" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(37) "Building DMZs For Enterprise Networks" ["image"]=> string(22) "/9/7/9780080476261.jpg" ["small_image"]=> string(22) "/9/7/9780080476261.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476261.jpg" ["image_label"]=> string(37) "Building DMZs For Enterprise Networks" ["small_image_label"]=> string(37) "Building DMZs For Enterprise Networks" ["thumbnail_label"]=> string(37) "Building DMZs For Enterprise Networks" ["url_key"]=> string(37) "building-dmzs-for-enterprise-networks" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal n" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "building-dmzs-for-enterprise-networks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book covers what an administrator needs to plan out...

    Rating:
    0%
    £37.99
    Add to Wish List
  17. Checkpoint Next Generation Security Administration object(Magento\Catalog\Model\Product\Interceptor)#13835 (33) { ["entity_id"]=> string(5) "55220" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476452" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:40" ["updated_at"]=> string(19) "2025-07-24 08:42:40" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(50) "Checkpoint Next Generation Security Administration" ["image"]=> string(22) "/9/7/9780080476452.jpg" ["small_image"]=> string(22) "/9/7/9780080476452.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476452.jpg" ["image_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["small_image_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["thumbnail_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["url_key"]=> string(50) "checkpoint-next-generation-security-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enabl" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "checkpoint-next-generation-security-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Unparalleled security management that IT professionals have been waiting for.Check...

    Rating:
    0%
    £36.99
    Add to Wish List
  18. CheckPoint NG VPN 1/Firewall 1 object(Magento\Catalog\Model\Product\Interceptor)#13834 (33) { ["entity_id"]=> string(5) "55164" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476469" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:49" ["updated_at"]=> string(19) "2025-07-24 08:41:49" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["image"]=> string(22) "/9/7/9780080476469.jpg" ["small_image"]=> string(22) "/9/7/9780080476469.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476469.jpg" ["image_label"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["small_image_label"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["thumbnail_label"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["url_key"]=> string(30) "checkpoint-ng-vpn-1-firewall-1" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announce" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "checkpoint-ng-vpn-1-firewall-1.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Check Point Software Technologies is the worldwide leader in securing...

    Rating:
    0%
    £37.99
    Add to Wish List
  19. Dr Tom Shinder's ISA Server and Beyond object(Magento\Catalog\Model\Product\Interceptor)#13833 (33) { ["entity_id"]=> string(5) "55431" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477398" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:56:50" ["updated_at"]=> string(19) "2025-07-24 08:56:50" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["image"]=> string(22) "/9/7/9780080477398.jpg" ["small_image"]=> string(22) "/9/7/9780080477398.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477398.jpg" ["image_label"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["small_image_label"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["thumbnail_label"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["url_key"]=> string(38) "dr-tom-shinder-s-isa-server-and-beyond" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "dr-tom-shinder-s-isa-server-and-beyond.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The terrorist attacks of September 11 signaled the dawn of...

    Rating:
    0%
    £39.99
    Add to Wish List
  20. Enemy at the Water Cooler object(Magento\Catalog\Model\Product\Interceptor)#13832 (33) { ["entity_id"]=> string(5) "55475" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477602" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:57:39" ["updated_at"]=> string(19) "2025-07-24 08:57:39" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(25) "Enemy at the Water Cooler" ["image"]=> string(22) "/9/7/9780080477602.jpg" ["small_image"]=> string(22) "/9/7/9780080477602.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477602.jpg" ["image_label"]=> string(25) "Enemy at the Water Cooler" ["small_image_label"]=> string(25) "Enemy at the Water Cooler" ["thumbnail_label"]=> string(25) "Enemy at the Water Cooler" ["url_key"]=> string(25) "enemy-at-the-water-cooler" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "enemy-at-the-water-cooler.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book covers a decade of work with some of...

    Rating:
    0%
    £32.99
    Add to Wish List
  21. Contemporary Security Management object(Magento\Catalog\Model\Product\Interceptor)#13831 (33) { ["entity_id"]=> string(5) "55296" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476827" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:44:11" ["updated_at"]=> string(19) "2025-07-24 08:54:18" ["price"]=> string(9) "47.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "47.990000" ["minimal_price"]=> string(9) "47.990000" ["min_price"]=> string(9) "47.990000" ["max_price"]=> string(9) "47.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(19) ["name"]=> string(32) "Contemporary Security Management" ["image"]=> string(24) "/9/7/9780080476827_1.jpg" ["small_image"]=> string(24) "/9/7/9780080476827_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080476827_1.jpg" ["image_label"]=> string(32) "Contemporary Security Management" ["small_image_label"]=> string(32) "Contemporary Security Management" ["thumbnail_label"]=> string(32) "Contemporary Security Management" ["url_key"]=> string(32) "contemporary-security-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Contemporary Security Management, Second Edition, is the most comprehensive and up-to-date security management book available. The book is designed to provide the hard facts on modern practices to efficiently and effectively run a security department. I" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "contemporary-security-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Contemporary Security Management, Second Edition, is the most comprehensive and...

    Rating:
    0%
    £47.99
    Add to Wish List
  22. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214) object(Magento\Catalog\Model\Product\Interceptor)#13830 (33) { ["entity_id"]=> string(5) "55789" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479316" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:03:53" ["updated_at"]=> string(19) "2025-07-24 09:03:53" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(20) ["name"]=> string(89) "MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214)" ["image"]=> string(22) "/9/7/9780080479316.jpg" ["small_image"]=> string(22) "/9/7/9780080479316.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479316.jpg" ["image_label"]=> string(89) "MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214)" ["small_image_label"]=> string(89) "MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214)" ["thumbnail_label"]=> string(89) "MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214)" ["url_key"]=> string(87) "mcse-mcsa-implementing-and-administering-security-in-a-windows-2000-network-exam-70-214" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book covers Exam 200-14 in great detail, digging into some of the most important details involved in locking down Windows systems and networks and taking a systemic approach to keeping Windows networks and systems secured.Boasting a one-of-a-kind int" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(92) "mcse-mcsa-implementing-and-administering-security-in-a-windows-2000-network-exam-70-214.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book covers Exam 200-14 in great detail, digging into...

    Rating:
    0%
    £39.99
    Add to Wish List
  23. Snort Intrusion Detection 2.0 object(Magento\Catalog\Model\Product\Interceptor)#13829 (33) { ["entity_id"]=> string(5) "56194" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481005" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:48" ["updated_at"]=> string(19) "2025-07-24 09:11:48" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(21) ["name"]=> string(29) "Snort Intrusion Detection 2.0" ["image"]=> string(22) "/9/7/9780080481005.jpg" ["small_image"]=> string(22) "/9/7/9780080481005.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481005.jpg" ["image_label"]=> string(29) "Snort Intrusion Detection 2.0" ["small_image_label"]=> string(29) "Snort Intrusion Detection 2.0" ["thumbnail_label"]=> string(29) "Snort Intrusion Detection 2.0" ["url_key"]=> string(28) "snort-intrusion-detection-20" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "snort-intrusion-detection-20.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The incredible low maintenance costs of Snort combined with its...

    Rating:
    0%
    £32.99
    Add to Wish List
  24. Physical Security Systems Handbook object(Magento\Catalog\Model\Product\Interceptor)#13828 (33) { ["entity_id"]=> string(5) "55992" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480008" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:07:58" ["updated_at"]=> string(19) "2025-07-24 09:07:58" ["price"]=> string(9) "40.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "40.990000" ["minimal_price"]=> string(9) "40.990000" ["min_price"]=> string(9) "40.990000" ["max_price"]=> string(9) "40.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(22) ["name"]=> string(34) "Physical Security Systems Handbook" ["image"]=> string(22) "/9/7/9780080480008.jpg" ["small_image"]=> string(22) "/9/7/9780080480008.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480008.jpg" ["image_label"]=> string(34) "Physical Security Systems Handbook" ["small_image_label"]=> string(34) "Physical Security Systems Handbook" ["thumbnail_label"]=> string(34) "Physical Security Systems Handbook" ["url_key"]=> string(34) "physical-security-systems-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed sur" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "physical-security-systems-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A practical reference written to assist the security professional in...

    Rating:
    0%
    £40.99
    Add to Wish List
  25. Microsoft Windows Security Fundamentals object(Magento\Catalog\Model\Product\Interceptor)#13820 (33) { ["entity_id"]=> string(5) "57989" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491882" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:44:11" ["updated_at"]=> string(19) "2025-07-24 09:44:11" ["price"]=> string(9) "56.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "56.990000" ["minimal_price"]=> string(9) "56.990000" ["min_price"]=> string(9) "56.990000" ["max_price"]=> string(9) "56.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(23) ["name"]=> string(39) "Microsoft Windows Security Fundamentals" ["image"]=> string(22) "/9/7/9780080491882.jpg" ["small_image"]=> string(22) "/9/7/9780080491882.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491882.jpg" ["image_label"]=> string(39) "Microsoft Windows Security Fundamentals" ["small_image_label"]=> string(39) "Microsoft Windows Security Fundamentals" ["thumbnail_label"]=> string(39) "Microsoft Windows Security Fundamentals" ["url_key"]=> string(39) "microsoft-windows-security-fundamentals" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "microsoft-windows-security-fundamentals.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the first of two books serving as an...

    Rating:
    0%
    £56.99
    Add to Wish List
  26. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals object(Magento\Catalog\Model\Product\Interceptor)#13821 (33) { ["entity_id"]=> string(5) "56898" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489728" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:51" ["updated_at"]=> string(19) "2025-07-24 09:24:51" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(24) ["name"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["image"]=> string(22) "/9/7/9780080489728.jpg" ["small_image"]=> string(22) "/9/7/9780080489728.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489728.jpg" ["image_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["small_image_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["thumbnail_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["url_key"]=> string(108) "sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyo" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(113) "sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book is logically divided into 5 main categories with...

    Rating:
    0%
    £31.99
    Add to Wish List
  27. Syngress IT Security Project Management Handbook object(Magento\Catalog\Model\Product\Interceptor)#13826 (33) { ["entity_id"]=> string(5) "57061" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489773" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:27:53" ["updated_at"]=> string(19) "2025-07-24 09:27:53" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(25) ["name"]=> string(48) "Syngress IT Security Project Management Handbook" ["image"]=> string(22) "/9/7/9780080489773.jpg" ["small_image"]=> string(22) "/9/7/9780080489773.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489773.jpg" ["image_label"]=> string(48) "Syngress IT Security Project Management Handbook" ["small_image_label"]=> string(48) "Syngress IT Security Project Management Handbook" ["thumbnail_label"]=> string(48) "Syngress IT Security Project Management Handbook" ["url_key"]=> string(48) "syngress-it-security-project-management-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intru" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "syngress-it-security-project-management-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The definitive work for IT professionals responsible for the management...

    Rating:
    0%
    £39.99
    Add to Wish List
  28. Elsevier's Dictionary of Information Security object(Magento\Catalog\Model\Product\Interceptor)#13823 (33) { ["entity_id"]=> string(5) "56713" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488806" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:25" ["updated_at"]=> string(19) "2025-07-24 09:21:25" ["price"]=> string(10) "175.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "175.000000" ["minimal_price"]=> string(10) "175.000000" ["min_price"]=> string(10) "175.000000" ["max_price"]=> string(10) "175.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(26) ["name"]=> string(45) "Elsevier's Dictionary of Information Security" ["image"]=> string(22) "/9/7/9780080488806.jpg" ["small_image"]=> string(22) "/9/7/9780080488806.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488806.jpg" ["image_label"]=> string(45) "Elsevier's Dictionary of Information Security" ["small_image_label"]=> string(45) "Elsevier's Dictionary of Information Security" ["thumbnail_label"]=> string(45) "Elsevier's Dictionary of Information Security" ["url_key"]=> string(45) "elsevier-s-dictionary-of-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The dictionary will contain terms currently used in the broad fields of electronics data protection and data management in today's interconnected world - the Global Village. The terminology will cover all aspects of the modern technology's best practices " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "elsevier-s-dictionary-of-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The dictionary will contain terms currently used in the broad...

    Rating:
    0%
    £175.00
    Add to Wish List
  29. Classical and Modern Cryptography for Beginners object(Magento\Catalog\Model\Product\Interceptor)#13818 (27) { ["entity_id"]=> string(5) "57112" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031329593" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:28:54" ["updated_at"]=> string(19) "2025-07-24 09:28:54" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(27) ["name"]=> string(47) "Classical and Modern Cryptography for Beginners" ["image_label"]=> string(47) "Classical and Modern Cryptography for Beginners" ["url_key"]=> string(47) "classical-and-modern-cryptography-for-beginners" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.  It also provides the information on the cryptography and a cryptosystem used by " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(52) "classical-and-modern-cryptography-for-beginners.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This textbook offers the knowledge and the mathematical background or...

    Rating:
    0%
    £54.99
    Add to Wish List
  30. Quiet Crypto Revolution object(Magento\Catalog\Model\Product\Interceptor)#13827 (27) { ["entity_id"]=> string(5) "58651" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484296271" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:55:57" ["updated_at"]=> string(19) "2025-07-24 11:55:57" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(28) ["name"]=> string(23) "Quiet Crypto Revolution" ["image_label"]=> string(23) "Quiet Crypto Revolution" ["url_key"]=> string(23) "quiet-crypto-revolution" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Crypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible languag" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "quiet-crypto-revolution.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Crypto is going to change the world, and for those...

    Rating:
    0%
    £19.99
    Add to Wish List
  31. Manager's Handbook for Corporate Security object(Magento\Catalog\Model\Product\Interceptor)#13815 (33) { ["entity_id"]=> string(5) "58461" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080496245" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:52:37" ["updated_at"]=> string(19) "2025-07-24 11:52:37" ["price"]=> string(9) "51.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "51.990000" ["minimal_price"]=> string(9) "51.990000" ["min_price"]=> string(9) "51.990000" ["max_price"]=> string(9) "51.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(29) ["name"]=> string(41) "Manager's Handbook for Corporate Security" ["image"]=> string(22) "/9/7/9780080496245.jpg" ["small_image"]=> string(22) "/9/7/9780080496245.jpg" ["thumbnail"]=> string(22) "/9/7/9780080496245.jpg" ["image_label"]=> string(41) "Manager's Handbook for Corporate Security" ["small_image_label"]=> string(41) "Manager's Handbook for Corporate Security" ["thumbnail_label"]=> string(41) "Manager's Handbook for Corporate Security" ["url_key"]=> string(41) "manager-s-handbook-for-corporate-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and s" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "manager-s-handbook-for-corporate-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Kovacich and Halibozek offer you the benefit of more than...

    Rating:
    0%
    £51.99
    Add to Wish List
  32. How to Cheat at Windows System Administration Using Command Line Scripts object(Magento\Catalog\Model\Product\Interceptor)#13825 (33) { ["entity_id"]=> string(5) "60000" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080508269" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:22:53" ["updated_at"]=> string(19) "2025-07-24 12:22:53" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(30) ["name"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["image"]=> string(22) "/9/7/9780080508269.jpg" ["small_image"]=> string(22) "/9/7/9780080508269.jpg" ["thumbnail"]=> string(22) "/9/7/9780080508269.jpg" ["image_label"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["small_image_label"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["thumbnail_label"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["url_key"]=> string(72) "how-to-cheat-at-windows-system-administration-using-command-line-scripts" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of W" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(77) "how-to-cheat-at-windows-system-administration-using-command-line-scripts.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    How to Cheat at Windows Systems Administrators using Command Line...

    Rating:
    0%
    £25.99
    Add to Wish List
  33. Improving your C# Skills object(Magento\Catalog\Model\Product\Interceptor)#14237 (27) { ["entity_id"]=> string(5) "65851" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781838550318" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:33:39" ["updated_at"]=> string(19) "2025-07-24 14:33:39" ["price"]=> string(9) "27.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "27.990000" ["minimal_price"]=> string(9) "27.990000" ["min_price"]=> string(9) "27.990000" ["max_price"]=> string(9) "27.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(31) ["name"]=> string(24) "Improving your C# Skills" ["image_label"]=> string(24) "Improving your C# Skills" ["url_key"]=> string(23) "improving-your-c-skills" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "

    Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.

    Key Features

  34. TechnoSecurity's Guide to E-Discovery and Digital Forensics object(Magento\Catalog\Model\Product\Interceptor)#14238 (33) { ["entity_id"]=> string(5) "67781" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558813" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:23" ["updated_at"]=> string(19) "2025-07-24 15:16:23" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(32) ["name"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["image"]=> string(22) "/9/7/9780080558813.jpg" ["small_image"]=> string(22) "/9/7/9780080558813.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558813.jpg" ["image_label"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["small_image_label"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["thumbnail_label"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["url_key"]=> string(59) "technosecurity-s-guide-to-e-discovery-and-digital-forensics" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(64) "technosecurity-s-guide-to-e-discovery-and-digital-forensics.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security...

    Rating:
    0%
    £38.99
    Add to Wish List
  35. Windows Forensic Analysis DVD Toolkit object(Magento\Catalog\Model\Product\Interceptor)#14240 (33) { ["entity_id"]=> string(5) "67379" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556444" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:06:54" ["updated_at"]=> string(19) "2025-07-24 15:06:54" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(33) ["name"]=> string(37) "Windows Forensic Analysis DVD Toolkit" ["image"]=> string(22) "/9/7/9780080556444.jpg" ["small_image"]=> string(22) "/9/7/9780080556444.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556444.jpg" ["image_label"]=> string(37) "Windows Forensic Analysis DVD Toolkit" ["small_image_label"]=> string(37) "Windows Forensic Analysis DVD Toolkit" ["thumbnail_label"]=> string(37) "Windows Forensic Analysis DVD Toolkit" ["url_key"]=> string(37) "windows-forensic-analysis-dvd-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Windows Forensic Analysis DVD Toolkit addresses and discusses in-depth forensic analysis of Windows systems. The book takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "windows-forensic-analysis-dvd-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Windows Forensic Analysis DVD Toolkit addresses and discusses in-depth forensic...

    Rating:
    0%
    £37.99
    Add to Wish List
  36. Best Damn Cybercrime and Digital Forensics Book Period object(Magento\Catalog\Model\Product\Interceptor)#14244 (33) { ["entity_id"]=> string(5) "67327" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556086" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:05:44" ["updated_at"]=> string(19) "2025-07-24 15:05:44" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(34) ["name"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["image"]=> string(22) "/9/7/9780080556086.jpg" ["small_image"]=> string(22) "/9/7/9780080556086.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556086.jpg" ["image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["small_image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["thumbnail_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["url_key"]=> string(54) "best-damn-cybercrime-and-digital-forensics-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "best-damn-cybercrime-and-digital-forensics-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Electronic discovery refers to a process in which electronic data...

    Rating:
    0%
    £36.99
    Add to Wish List
  37. Best Damn IT Security Management Book Period object(Magento\Catalog\Model\Product\Interceptor)#14243 (33) { ["entity_id"]=> string(5) "67407" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080557335" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:07:34" ["updated_at"]=> string(19) "2025-07-24 15:07:34" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(35) ["name"]=> string(44) "Best Damn IT Security Management Book Period" ["image"]=> string(22) "/9/7/9780080557335.jpg" ["small_image"]=> string(22) "/9/7/9780080557335.jpg" ["thumbnail"]=> string(22) "/9/7/9780080557335.jpg" ["image_label"]=> string(44) "Best Damn IT Security Management Book Period" ["small_image_label"]=> string(44) "Best Damn IT Security Management Book Period" ["thumbnail_label"]=> string(44) "Best Damn IT Security Management Book Period" ["url_key"]=> string(44) "best-damn-it-security-management-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issue" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "best-damn-it-security-management-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The security field evolves rapidly becoming broader and more complex...

    Rating:
    0%
    £38.99
    Add to Wish List
  38. Hacking Exposed object(Magento\Catalog\Model\Product\Interceptor)#14245 (33) { ["entity_id"]=> string(5) "49519" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072192148" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:40" ["updated_at"]=> string(19) "2025-07-24 06:46:43" ["price"]=> string(9) "39.600000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.600000" ["minimal_price"]=> string(9) "39.600000" ["min_price"]=> string(9) "39.600000" ["max_price"]=> string(9) "39.600000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(36) ["name"]=> string(15) "Hacking Exposed" ["image"]=> string(24) "/9/7/9780072192148_1.jpg" ["small_image"]=> string(24) "/9/7/9780072192148_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072192148_1.jpg" ["image_label"]=> string(15) "Hacking Exposed" ["small_image_label"]=> string(15) "Hacking Exposed" ["thumbnail_label"]=> string(15) "Hacking Exposed" ["url_key"]=> string(15) "hacking-exposed" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(125) "This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(20) "hacking-exposed.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This one-of-a-kind book provides in-depth expert insight into how hackers...

    Rating:
    0%
    £39.60
    Add to Wish List
  39. PKI: Implementing & Managing E-Security object(Magento\Catalog\Model\Product\Interceptor)#14246 (33) { ["entity_id"]=> string(5) "49524" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072192261" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:47" ["updated_at"]=> string(19) "2025-07-24 06:46:52" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(37) ["name"]=> string(39) "PKI: Implementing & Managing E-Security" ["image"]=> string(24) "/9/7/9780072192261_1.jpg" ["small_image"]=> string(24) "/9/7/9780072192261_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072192261_1.jpg" ["image_label"]=> string(39) "PKI: Implementing & Managing E-Security" ["small_image_label"]=> string(39) "PKI: Implementing & Managing E-Security" ["thumbnail_label"]=> string(39) "PKI: Implementing & Managing E-Security" ["url_key"]=> string(36) "pki-implementing-managing-e-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(196) "Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(41) "pki-implementing-managing-e-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by the experts at RSA Security, this book will...

    Rating:
    0%
    £54.90
    Add to Wish List
  40. Hack Proofing Your Identity In The Information Age object(Magento\Catalog\Model\Product\Interceptor)#14247 (33) { ["entity_id"]=> string(5) "55513" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478081" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:20" ["updated_at"]=> string(19) "2025-07-24 08:58:20" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(38) ["name"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["image"]=> string(22) "/9/7/9780080478081.jpg" ["small_image"]=> string(22) "/9/7/9780080478081.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478081.jpg" ["image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["small_image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["thumbnail_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["url_key"]=> string(50) "hack-proofing-your-identity-in-the-information-age" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "hack-proofing-your-identity-in-the-information-age.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Identity-theft is the fastest growing crime in America, affecting approximately...

    Rating:
    0%
    £25.99
    Add to Wish List
  41. Nokia Network Security Solutions Handbook object(Magento\Catalog\Model\Product\Interceptor)#14248 (33) { ["entity_id"]=> string(5) "55919" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479712" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:06:30" ["updated_at"]=> string(19) "2025-07-24 09:06:30" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(39) ["name"]=> string(41) "Nokia Network Security Solutions Handbook" ["image"]=> string(22) "/9/7/9780080479712.jpg" ["small_image"]=> string(22) "/9/7/9780080479712.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479712.jpg" ["image_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["small_image_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["thumbnail_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["url_key"]=> string(41) "nokia-network-security-solutions-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "nokia-network-security-solutions-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Nokia Network Security Solutions Handbook introduces readers to both...

    Rating:
    0%
    £37.99
    Add to Wish List
  42. Snort 2.1 Intrusion Detection, Second Edition object(Magento\Catalog\Model\Product\Interceptor)#14249 (33) { ["entity_id"]=> string(5) "56193" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480992" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:46" ["updated_at"]=> string(19) "2025-07-24 09:11:46" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(40) ["name"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["image"]=> string(22) "/9/7/9780080480992.jpg" ["small_image"]=> string(22) "/9/7/9780080480992.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480992.jpg" ["image_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["small_image_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["thumbnail_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["url_key"]=> string(43) "snort-21-intrusion-detection-second-edition" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Called "e;the leader in the Snort IDS book arms race"e; by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "snort-21-intrusion-detection-second-edition.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Called "e;the leader in the Snort IDS book arms race"e;...

    Rating:
    0%
    £31.99
    Add to Wish List
  43. Security + Study Guide and DVD Training System object(Magento\Catalog\Model\Product\Interceptor)#14250 (33) { ["entity_id"]=> string(5) "56170" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480817" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:16" ["updated_at"]=> string(19) "2025-07-24 09:11:16" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(41) ["name"]=> string(46) "Security + Study Guide and DVD Training System" ["image"]=> string(22) "/9/7/9780080480817.jpg" ["small_image"]=> string(22) "/9/7/9780080480817.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480817.jpg" ["image_label"]=> string(46) "Security + Study Guide and DVD Training System" ["small_image_label"]=> string(46) "Security + Study Guide and DVD Training System" ["thumbnail_label"]=> string(46) "Security + Study Guide and DVD Training System" ["url_key"]=> string(44) "security-study-guide-and-dvd-training-system" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential? Thanks to soaring e-business initiatives and worldwide Internet connectivity," ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "security-study-guide-and-dvd-training-system.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Why has CompTIA (the high-profile Computer Technology Industry Association behind...

    Rating:
    0%
    £37.99
    Add to Wish List
  44. Information Security Best Practices object(Magento\Catalog\Model\Product\Interceptor)#14251 (33) { ["entity_id"]=> string(5) "57902" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491547" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:42:36" ["updated_at"]=> string(19) "2025-07-24 09:42:36" ["price"]=> string(9) "33.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "33.990000" ["minimal_price"]=> string(9) "33.990000" ["min_price"]=> string(9) "33.990000" ["max_price"]=> string(9) "33.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(42) ["name"]=> string(35) "Information Security Best Practices" ["image"]=> string(22) "/9/7/9780080491547.jpg" ["small_image"]=> string(22) "/9/7/9780080491547.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491547.jpg" ["image_label"]=> string(35) "Information Security Best Practices" ["small_image_label"]=> string(35) "Information Security Best Practices" ["thumbnail_label"]=> string(35) "Information Security Best Practices" ["url_key"]=> string(35) "information-security-best-practices" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "information-security-best-practices.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Protecting computer networks and their client computers against willful (or...

    Rating:
    0%
    £33.99
    Add to Wish List
  45. Data Hiding Fundamentals and Applications object(Magento\Catalog\Model\Product\Interceptor)#14252 (33) { ["entity_id"]=> string(5) "56698" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488660" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:05" ["updated_at"]=> string(19) "2025-07-24 09:21:05" ["price"]=> string(9) "58.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "58.990000" ["minimal_price"]=> string(9) "58.990000" ["min_price"]=> string(9) "58.990000" ["max_price"]=> string(9) "58.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(43) ["name"]=> string(41) "Data Hiding Fundamentals and Applications" ["image"]=> string(22) "/9/7/9780080488660.jpg" ["small_image"]=> string(22) "/9/7/9780080488660.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488660.jpg" ["image_label"]=> string(41) "Data Hiding Fundamentals and Applications" ["small_image_label"]=> string(41) "Data Hiding Fundamentals and Applications" ["thumbnail_label"]=> string(41) "Data Hiding Fundamentals and Applications" ["url_key"]=> string(41) "data-hiding-fundamentals-and-applications" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and so" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "data-hiding-fundamentals-and-applications.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Multimedia technologies are becoming more sophisticated, enabling the Internet to...

    Rating:
    0%
    £58.99
    Add to Wish List
  46. Network Security Evaluation Using the NSA IEM object(Magento\Catalog\Model\Product\Interceptor)#14253 (33) { ["entity_id"]=> string(5) "56886" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489438" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:34" ["updated_at"]=> string(19) "2025-07-24 09:24:34" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(44) ["name"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["image"]=> string(22) "/9/7/9780080489438.jpg" ["small_image"]=> string(22) "/9/7/9780080489438.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489438.jpg" ["image_label"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["small_image_label"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["thumbnail_label"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["url_key"]=> string(45) "network-security-evaluation-using-the-nsa-iem" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, includ" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "network-security-evaluation-using-the-nsa-iem.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Network Security Evaluation provides a methodology for conducting technical security...

    Rating:
    0%
    £38.99
    Add to Wish List
  47. Perfect Password object(Magento\Catalog\Model\Product\Interceptor)#14254 (33) { ["entity_id"]=> string(5) "56926" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489513" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:25:29" ["updated_at"]=> string(19) "2025-07-24 09:25:29" ["price"]=> string(9) "15.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "15.990000" ["minimal_price"]=> string(9) "15.990000" ["min_price"]=> string(9) "15.990000" ["max_price"]=> string(9) "15.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(45) ["name"]=> string(16) "Perfect Password" ["image"]=> string(22) "/9/7/9780080489513.jpg" ["small_image"]=> string(22) "/9/7/9780080489513.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489513.jpg" ["image_label"]=> string(16) "Perfect Password" ["small_image_label"]=> string(16) "Perfect Password" ["thumbnail_label"]=> string(16) "Perfect Password" ["url_key"]=> string(16) "perfect-password" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "perfect-password.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    User passwords are the keys to the network kingdom, yet...

    Rating:
    0%
    £15.99
    Add to Wish List
  48. Blockchain Essentials object(Magento\Catalog\Model\Product\Interceptor)#14255 (27) { ["entity_id"]=> string(5) "61610" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484299753" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 13:00:00" ["updated_at"]=> string(19) "2025-07-24 13:00:00" ["price"]=> string(9) "49.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "49.990000" ["minimal_price"]=> string(9) "49.990000" ["min_price"]=> string(9) "49.990000" ["max_price"]=> string(9) "49.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(46) ["name"]=> string(21) "Blockchain Essentials" ["image_label"]=> string(21) "Blockchain Essentials" ["url_key"]=> string(21) "blockchain-essentials" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity. The 50 programs presented in this book are all you ne" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(26) "blockchain-essentials.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book will teach you the core concepts of blockchain...

    Rating:
    0%
    £49.99
    Add to Wish List
  49. Digital Watermarking object(Magento\Catalog\Model\Product\Interceptor)#14256 (33) { ["entity_id"]=> string(5) "59485" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080504599" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:11:01" ["updated_at"]=> string(19) "2025-07-24 12:11:01" ["price"]=> string(9) "59.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "59.990000" ["minimal_price"]=> string(9) "59.990000" ["min_price"]=> string(9) "59.990000" ["max_price"]=> string(9) "59.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(47) ["name"]=> string(20) "Digital Watermarking" ["image"]=> string(22) "/9/7/9780080504599.jpg" ["small_image"]=> string(22) "/9/7/9780080504599.jpg" ["thumbnail"]=> string(22) "/9/7/9780080504599.jpg" ["image_label"]=> string(20) "Digital Watermarking" ["small_image_label"]=> string(20) "Digital Watermarking" ["thumbnail_label"]=> string(20) "Digital Watermarking" ["url_key"]=> string(20) "digital-watermarking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(25) "digital-watermarking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Digital watermarking is a key ingredient to copyright protection. It...

    Rating:
    0%
    £59.99
    Add to Wish List
  50. Joe Grand's Best of Hardware, Wireless, and Game Console Hacking object(Magento\Catalog\Model\Product\Interceptor)#14257 (33) { ["entity_id"]=> string(5) "60115" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080509662" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:25:34" ["updated_at"]=> string(19) "2025-07-24 12:25:34" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(48) ["name"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["image"]=> string(22) "/9/7/9780080509662.jpg" ["small_image"]=> string(22) "/9/7/9780080509662.jpg" ["thumbnail"]=> string(22) "/9/7/9780080509662.jpg" ["image_label"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["small_image_label"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["thumbnail_label"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["url_key"]=> string(62) "joe-grand-s-best-of-hardware-wireless-and-game-console-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(67) "joe-grand-s-best-of-hardware-wireless-and-game-console-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book introduces the principles of hardware design and describes...

    Rating:
    0%
    £19.99
    Add to Wish List
  51. Java Cryptography Extensions object(Magento\Catalog\Model\Product\Interceptor)#14258 (33) { ["entity_id"]=> string(5) "64222" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080535241" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 13:57:46" ["updated_at"]=> string(19) "2025-07-24 13:57:46" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(49) ["name"]=> string(28) "Java Cryptography Extensions" ["image"]=> string(22) "/9/7/9780080535241.jpg" ["small_image"]=> string(22) "/9/7/9780080535241.jpg" ["thumbnail"]=> string(22) "/9/7/9780080535241.jpg" ["image_label"]=> string(28) "Java Cryptography Extensions" ["small_image_label"]=> string(28) "Java Cryptography Extensions" ["thumbnail_label"]=> string(28) "Java Cryptography Extensions" ["url_key"]=> string(28) "java-cryptography-extensions" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researcher" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "java-cryptography-extensions.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    For a long time, there has been a need for...

    Rating:
    0%
    £19.99
    Add to Wish List
  52. Snort Intrusion Detection and Prevention Toolkit object(Magento\Catalog\Model\Product\Interceptor)#14259 (33) { ["entity_id"]=> string(5) "66371" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080549279" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:44:55" ["updated_at"]=> string(19) "2025-07-24 14:44:55" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(50) ["name"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["image"]=> string(22) "/9/7/9780080549279.jpg" ["small_image"]=> string(22) "/9/7/9780080549279.jpg" ["thumbnail"]=> string(22) "/9/7/9780080549279.jpg" ["image_label"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["small_image_label"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["thumbnail_label"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["url_key"]=> string(48) "snort-intrusion-detection-and-prevention-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of S" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "snort-intrusion-detection-and-prevention-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This all new book covering the brand new Snort version...

    Rating:
    0%
    £30.99
    Add to Wish List
  53. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research object(Magento\Catalog\Model\Product\Interceptor)#14260 (33) { ["entity_id"]=> string(5) "66370" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080549255" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:44:53" ["updated_at"]=> string(19) "2025-07-24 14:44:53" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(51) ["name"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["image"]=> string(22) "/9/7/9780080549255.jpg" ["small_image"]=> string(22) "/9/7/9780080549255.jpg" ["thumbnail"]=> string(22) "/9/7/9780080549255.jpg" ["image_label"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["small_image_label"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["thumbnail_label"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["url_key"]=> string(89) "metasploit-toolkit-for-penetration-testing-exploit-development-and-vulnerability-research" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penet" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(94) "metasploit-toolkit-for-penetration-testing-exploit-development-and-vulnerability-research.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research...

    Rating:
    0%
    £38.99
    Add to Wish List
  54. InfoSecurity 2008 Threat Analysis object(Magento\Catalog\Model\Product\Interceptor)#14261 (33) { ["entity_id"]=> string(5) "67774" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558691" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:04" ["updated_at"]=> string(19) "2025-07-24 15:16:04" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(52) ["name"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["image"]=> string(22) "/9/7/9780080558691.jpg" ["small_image"]=> string(22) "/9/7/9780080558691.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558691.jpg" ["image_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["small_image_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["thumbnail_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["url_key"]=> string(33) "infosecurity-2008-threat-analysis" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing en" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "infosecurity-2008-threat-analysis.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    An all-star cast of authors analyze the top IT security...

    Rating:
    0%
    £38.99
    Add to Wish List
  55. Managing Catastrophic Loss of Sensitive Data object(Magento\Catalog\Model\Product\Interceptor)#14262 (33) { ["entity_id"]=> string(5) "67776" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558714" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:07" ["updated_at"]=> string(19) "2025-07-24 15:16:07" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(53) ["name"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["image"]=> string(22) "/9/7/9780080558714.jpg" ["small_image"]=> string(22) "/9/7/9780080558714.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558714.jpg" ["image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["small_image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["thumbnail_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["url_key"]=> string(44) "managing-catastrophic-loss-of-sensitive-data" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadma" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "managing-catastrophic-loss-of-sensitive-data.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Offering a structured approach to handling and recovering from a...

    Rating:
    0%
    £38.99
    Add to Wish List
  56. SQL Server Security object(Magento\Catalog\Model\Product\Interceptor)#14263 (33) { ["entity_id"]=> string(5) "49531" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072230321" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:57" ["updated_at"]=> string(19) "2025-07-24 06:47:03" ["price"]=> string(9) "61.200000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "61.200000" ["minimal_price"]=> string(9) "61.200000" ["min_price"]=> string(9) "61.200000" ["max_price"]=> string(9) "61.200000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(54) ["name"]=> string(19) "SQL Server Security" ["image"]=> string(24) "/9/7/9780072230321_1.jpg" ["small_image"]=> string(24) "/9/7/9780072230321_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072230321_1.jpg" ["image_label"]=> string(19) "SQL Server Security" ["small_image_label"]=> string(19) "SQL Server Security" ["thumbnail_label"]=> string(19) "SQL Server Security" ["url_key"]=> string(19) "sql-server-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Addresses SQL Server vulnerabilities and provides security solutions. Covers installation, administration, and programming--plus security issues such as authentication, encryption, intrusion detection, and more. Written for IT professionals administering " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "sql-server-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Addresses SQL Server vulnerabilities and provides security solutions. Covers installation,...

    Rating:
    0%
    £61.20
    Add to Wish List
  57. Wireless Security object(Magento\Catalog\Model\Product\Interceptor)#14264 (33) { ["entity_id"]=> string(5) "49666" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228328" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:41:09" ["updated_at"]=> string(19) "2025-07-24 06:50:06" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(55) ["name"]=> string(17) "Wireless Security" ["image"]=> string(24) "/9/7/9780072228328_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228328_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228328_1.jpg" ["image_label"]=> string(17) "Wireless Security" ["small_image_label"]=> string(17) "Wireless Security" ["thumbnail_label"]=> string(17) "Wireless Security" ["url_key"]=> string(17) "wireless-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "wireless-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Get full details on major mobile/wireless clients and operating systems--including...

    Rating:
    0%
    £54.90
    Add to Wish List
  58. Bulletproof Wireless Security object(Magento\Catalog\Model\Product\Interceptor)#14265 (33) { ["entity_id"]=> string(5) "55202" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476315" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:20" ["updated_at"]=> string(19) "2025-07-24 08:42:20" ["price"]=> string(9) "43.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "43.990000" ["minimal_price"]=> string(9) "43.990000" ["min_price"]=> string(9) "43.990000" ["max_price"]=> string(9) "43.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(56) ["name"]=> string(29) "Bulletproof Wireless Security" ["image"]=> string(22) "/9/7/9780080476315.jpg" ["small_image"]=> string(22) "/9/7/9780080476315.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476315.jpg" ["image_label"]=> string(29) "Bulletproof Wireless Security" ["small_image_label"]=> string(29) "Bulletproof Wireless Security" ["thumbnail_label"]=> string(29) "Bulletproof Wireless Security" ["url_key"]=> string(29) "bulletproof-wireless-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Finally--a single volume guide to really effective security for both voice and data wireless networks!More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "e;bul" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "bulletproof-wireless-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Finally--a single volume guide to really effective security for both...

    Rating:
    0%
    £43.99
    Add to Wish List
  59. Hack Proofing Linux object(Magento\Catalog\Model\Product\Interceptor)#14266 (33) { ["entity_id"]=> string(5) "55536" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478111" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:48" ["updated_at"]=> string(19) "2025-07-24 08:58:48" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(57) ["name"]=> string(19) "Hack Proofing Linux" ["image"]=> string(22) "/9/7/9780080478111.jpg" ["small_image"]=> string(22) "/9/7/9780080478111.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478111.jpg" ["image_label"]=> string(19) "Hack Proofing Linux" ["small_image_label"]=> string(19) "Hack Proofing Linux" ["thumbnail_label"]=> string(19) "Hack Proofing Linux" ["url_key"]=> string(19) "hack-proofing-linux" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrator" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "hack-proofing-linux.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the authors of the bestselling E-Mail Virus Protection Handbook!The...

    Rating:
    0%
    £31.99
    Add to Wish List
  60. SSCP Systems Security Certified Practitioner Study Guide and DVD Training System object(Magento\Catalog\Model\Product\Interceptor)#14267 (33) { ["entity_id"]=> string(5) "56183" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481074" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:31" ["updated_at"]=> string(19) "2025-07-24 09:11:31" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(58) ["name"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["image"]=> string(22) "/9/7/9780080481074.jpg" ["small_image"]=> string(22) "/9/7/9780080481074.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481074.jpg" ["image_label"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["small_image_label"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["thumbnail_label"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["url_key"]=> string(80) "sscp-systems-security-certified-practitioner-study-guide-and-dvd-training-system" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC)2 official" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(85) "sscp-systems-security-certified-practitioner-study-guide-and-dvd-training-system.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The SSCP Study Guide and DVD Training System is a...

    Rating:
    0%
    £39.99
    Add to Wish List
  61. Security Log Management object(Magento\Catalog\Model\Product\Interceptor)#14268 (33) { ["entity_id"]=> string(5) "56897" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489704" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:50" ["updated_at"]=> string(19) "2025-07-24 09:24:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(59) ["name"]=> string(23) "Security Log Management" ["image"]=> string(22) "/9/7/9780080489704.jpg" ["small_image"]=> string(22) "/9/7/9780080489704.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489704.jpg" ["image_label"]=> string(23) "Security Log Management" ["small_image_label"]=> string(23) "Security Log Management" ["thumbnail_label"]=> string(23) "Security Log Management" ["url_key"]=> string(23) "security-log-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "security-log-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book teaches IT professionals how to analyze, manage, and...

    Rating:
    0%
    £31.99
    Add to Wish List
  62. Cryptography for Developers object(Magento\Catalog\Model\Product\Interceptor)#14269 (33) { ["entity_id"]=> string(5) "59958" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080503455" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:21:53" ["updated_at"]=> string(19) "2025-07-24 12:21:53" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(60) ["name"]=> string(27) "Cryptography for Developers" ["image"]=> string(22) "/9/7/9780080503455.jpg" ["small_image"]=> string(22) "/9/7/9780080503455.jpg" ["thumbnail"]=> string(22) "/9/7/9780080503455.jpg" ["image_label"]=> string(27) "Cryptography for Developers" ["small_image_label"]=> string(27) "Cryptography for Developers" ["thumbnail_label"]=> string(27) "Cryptography for Developers" ["url_key"]=> string(27) "cryptography-for-developers" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to i" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(32) "cryptography-for-developers.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only guide for software developers who must learn and...

    Rating:
    0%
    £38.99
    Add to Wish List
  63. Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security object(Magento\Catalog\Model\Product\Interceptor)#14270 (33) { ["entity_id"]=> string(5) "59684" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080505893" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:14:58" ["updated_at"]=> string(19) "2025-07-24 12:14:58" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(61) ["name"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["image"]=> string(22) "/9/7/9780080505893.jpg" ["small_image"]=> string(22) "/9/7/9780080505893.jpg" ["thumbnail"]=> string(22) "/9/7/9780080505893.jpg" ["image_label"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["small_image_label"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["thumbnail_label"]=> string(87) "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security" ["url_key"]=> string(84) "essential-computer-security-everyone-s-guide-to-email-internet-and-wireless-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(89) "essential-computer-security-everyone-s-guide-to-email-internet-and-wireless-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Essential Computer Security provides the vast home user and small...

    Rating:
    0%
    £19.99
    Add to Wish List
  64. Trojans, Worms, and Spyware object(Magento\Catalog\Model\Product\Interceptor)#14271 (33) { ["entity_id"]=> string(5) "61372" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080519685" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:54:20" ["updated_at"]=> string(19) "2025-07-24 12:54:20" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(62) ["name"]=> string(27) "Trojans, Worms, and Spyware" ["image"]=> string(22) "/9/7/9780080519685.jpg" ["small_image"]=> string(22) "/9/7/9780080519685.jpg" ["thumbnail"]=> string(22) "/9/7/9780080519685.jpg" ["image_label"]=> string(27) "Trojans, Worms, and Spyware" ["small_image_label"]=> string(27) "Trojans, Worms, and Spyware" ["thumbnail_label"]=> string(27) "Trojans, Worms, and Spyware" ["url_key"]=> string(25) "trojans-worms-and-spyware" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems securit" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "trojans-worms-and-spyware.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Trojans, Worms, and Spyware provides practical, easy to understand, and...

    Rating:
    0%
    £36.99
    Add to Wish List
  65. Video Coding for Mobile Communications object(Magento\Catalog\Model\Product\Interceptor)#14272 (33) { ["entity_id"]=> string(5) "61468" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080520544" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:56:41" ["updated_at"]=> string(19) "2025-07-24 12:56:41" ["price"]=> string(9) "79.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "79.000000" ["minimal_price"]=> string(9) "79.000000" ["min_price"]=> string(9) "79.000000" ["max_price"]=> string(9) "79.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(63) ["name"]=> string(38) "Video Coding for Mobile Communications" ["image"]=> string(22) "/9/7/9780080520544.jpg" ["small_image"]=> string(22) "/9/7/9780080520544.jpg" ["thumbnail"]=> string(22) "/9/7/9780080520544.jpg" ["image_label"]=> string(38) "Video Coding for Mobile Communications" ["small_image_label"]=> string(38) "Video Coding for Mobile Communications" ["thumbnail_label"]=> string(38) "Video Coding for Mobile Communications" ["url_key"]=> string(38) "video-coding-for-mobile-communications" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "In order for wireless devices to function, the signals must be coded in standard ways so that the sender and the receiver can communicate. This area of video source coding is one of the key challenges in the worldwide push to deliver full video communicat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "video-coding-for-mobile-communications.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In order for wireless devices to function, the signals must...

    Rating:
    0%
    £79.00
    Add to Wish List
  66. Building With Ethereum object(Magento\Catalog\Model\Product\Interceptor)#14273 (27) { ["entity_id"]=> string(5) "65471" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484290453" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:24:39" ["updated_at"]=> string(19) "2025-07-24 14:24:39" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(64) ["name"]=> string(22) "Building With Ethereum" ["image_label"]=> string(22) "Building With Ethereum" ["url_key"]=> string(22) "building-with-ethereum" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Build products on top of Ethereum's new and expansive technological stack.Writing any good web application requires planning, care, and deft technical skills, but Ethereum's execution model presents its own challenges for engineers wishing to build applic" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(27) "building-with-ethereum.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Build products on top of Ethereum's new and expansive technological...

    Rating:
    0%
    £54.99
    Add to Wish List
  67. History of Information Security object(Magento\Catalog\Model\Product\Interceptor)#14274 (33) { ["entity_id"]=> string(5) "66467" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080550589" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:47:00" ["updated_at"]=> string(19) "2025-07-24 14:47:00" ["price"]=> string(10) "165.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "165.000000" ["minimal_price"]=> string(10) "165.000000" ["min_price"]=> string(10) "165.000000" ["max_price"]=> string(10) "165.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(65) ["name"]=> string(31) "History of Information Security" ["image"]=> string(22) "/9/7/9780080550589.jpg" ["small_image"]=> string(22) "/9/7/9780080550589.jpg" ["thumbnail"]=> string(22) "/9/7/9780080550589.jpg" ["image_label"]=> string(31) "History of Information Security" ["small_image_label"]=> string(31) "History of Information Security" ["thumbnail_label"]=> string(31) "History of Information Security" ["url_key"]=> string(31) "history-of-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "history-of-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Information Security is usually achieved through a mix of technical,...

    Rating:
    0%
    £165.00
    Add to Wish List
  68. Digital Watermarking and Steganography object(Magento\Catalog\Model\Product\Interceptor)#14275 (33) { ["entity_id"]=> string(5) "67281" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555805" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:31" ["updated_at"]=> string(19) "2025-07-24 15:04:31" ["price"]=> string(9) "58.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "58.990000" ["minimal_price"]=> string(9) "58.990000" ["min_price"]=> string(9) "58.990000" ["max_price"]=> string(9) "58.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(66) ["name"]=> string(38) "Digital Watermarking and Steganography" ["image"]=> string(22) "/9/7/9780080555805.jpg" ["small_image"]=> string(22) "/9/7/9780080555805.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555805.jpg" ["image_label"]=> string(38) "Digital Watermarking and Steganography" ["small_image_label"]=> string(38) "Digital Watermarking and Steganography" ["thumbnail_label"]=> string(38) "Digital Watermarking and Steganography" ["url_key"]=> string(38) "digital-watermarking-and-steganography" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "digital-watermarking-and-steganography.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Digital audio, video, images, and documents are flying through cyberspace...

    Rating:
    0%
    £58.99
    Add to Wish List
  69. Microsoft Vista for IT Security Professionals object(Magento\Catalog\Model\Product\Interceptor)#14276 (33) { ["entity_id"]=> string(5) "67334" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556147" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:05:55" ["updated_at"]=> string(19) "2025-07-24 15:05:55" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(67) ["name"]=> string(45) "Microsoft Vista for IT Security Professionals" ["image"]=> string(22) "/9/7/9780080556147.jpg" ["small_image"]=> string(22) "/9/7/9780080556147.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556147.jpg" ["image_label"]=> string(45) "Microsoft Vista for IT Security Professionals" ["small_image_label"]=> string(45) "Microsoft Vista for IT Security Professionals" ["thumbnail_label"]=> string(45) "Microsoft Vista for IT Security Professionals" ["url_key"]=> string(45) "microsoft-vista-for-it-security-professionals" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn h" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "microsoft-vista-for-it-security-professionals.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft Vista for IT Security Professionals is designed for the...

    Rating:
    0%
    £38.99
    Add to Wish List
Filter
Set Descending Direction

68 Items

per page