Books

Filter
Set Descending Direction

Items 1-72 of 620

Page
per page
  1. CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) object(Magento\Catalog\Model\Product\Interceptor)#18139 (31) { ["entity_id"]=> string(5) "29628" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781260462258" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-04-25 10:45:31" ["updated_at"]=> string(19) "2025-07-24 12:31:37" ["price"]=> string(9) "36.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.000000" ["minimal_price"]=> string(9) "36.000000" ["min_price"]=> string(9) "36.000000" ["max_price"]=> string(9) "36.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(73) "CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)" ["image"]=> string(24) "/9/7/9781260462258_1.jpg" ["small_image"]=> string(24) "/9/7/9781260462258_1.jpg" ["thumbnail"]=> string(24) "/9/7/9781260462258_1.jpg" ["image_label"]=> string(73) "CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)" ["url_key"]=> string(70) "comptia-cysa-cybersecurity-analyst-certification-passport-exam-cs0-002" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(75) "comptia-cysa-cybersecurity-analyst-certification-passport-exam-cs0-002.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Focused coverage of every topic on the current version of...

    Rating:
    0%
    £36.00
    Add to Wish List
  2. SpringerBriefs in Cybersecurity object(Magento\Catalog\Model\Product\Interceptor)#18118 (27) { ["entity_id"]=> string(5) "49750" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783030136901" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:43:18" ["updated_at"]=> string(19) "2025-07-24 06:52:02" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(31) "SpringerBriefs in Cybersecurity" ["image_label"]=> string(31) "SpringerBriefs in Cybersecurity" ["url_key"]=> string(31) "springerbriefs-in-cybersecurity" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend compu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "springerbriefs-in-cybersecurity.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book describes the methodologies and tools used to conduct...

    Rating:
    0%
    £54.99
    Add to Wish List
  3. Advances in Information Security object(Magento\Catalog\Model\Product\Interceptor)#18649 (27) { ["entity_id"]=> string(5) "49853" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031268458" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:45:07" ["updated_at"]=> string(19) "2025-07-24 06:53:55" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(32) "Advances in Information Security" ["image_label"]=> string(32) "Advances in Information Security" ["url_key"]=> string(32) "advances-in-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending org" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "advances-in-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In today's digital transformation environments, a rigorous cybersecurity approach to...

    Rating:
    0%
    £54.99
    Add to Wish List
  4. Big Data Management object(Magento\Catalog\Model\Product\Interceptor)#18167 (27) { ["entity_id"]=> string(5) "49918" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9789811675669" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:46:10" ["updated_at"]=> string(19) "2025-07-24 06:54:56" ["price"]=> string(10) "119.500000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "119.500000" ["minimal_price"]=> string(10) "119.500000" ["min_price"]=> string(10) "119.500000" ["max_price"]=> string(10) "119.500000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(19) "Big Data Management" ["image_label"]=> string(19) "Big Data Management" ["url_key"]=> string(19) "big-data-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "The development of information technology has made it possible to collect large amounts of spatial data on a daily basis. It is of enormous significance when it comes to discovering implicit, non-trivial and potentially valuable information from this spat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "big-data-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The development of information technology has made it possible to...

    Rating:
    0%
    £119.50
    Add to Wish List
  5. Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities object(Magento\Catalog\Model\Product\Interceptor)#18157 (33) { ["entity_id"]=> string(5) "53790" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781040252383" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:18:10" ["updated_at"]=> string(19) "2025-07-24 08:18:10" ["price"]=> string(9) "49.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "49.990000" ["minimal_price"]=> string(9) "49.990000" ["min_price"]=> string(9) "49.990000" ["max_price"]=> string(9) "49.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["image"]=> string(22) "/9/7/9781040252383.jpg" ["small_image"]=> string(22) "/9/7/9781040252383.jpg" ["thumbnail"]=> string(22) "/9/7/9781040252383.jpg" ["image_label"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["small_image_label"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["thumbnail_label"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["url_key"]=> string(76) "artificial-intelligence-and-iot-for-cyber-security-solutions-in-smart-cities" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk assessmen" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(81) "artificial-intelligence-and-iot-for-cyber-security-solutions-in-smart-cities.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book offers a comprehensive overview of the current state...

    Rating:
    0%
    £49.99
    Add to Wish List
  6. CCTV object(Magento\Catalog\Model\Product\Interceptor)#18131 (33) { ["entity_id"]=> string(5) "54023" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080472195" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:21:52" ["updated_at"]=> string(19) "2025-07-24 08:21:52" ["price"]=> string(9) "64.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "64.990000" ["minimal_price"]=> string(9) "64.990000" ["min_price"]=> string(9) "64.990000" ["max_price"]=> string(9) "64.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(4) "CCTV" ["image"]=> string(22) "/9/7/9780080472195.jpg" ["small_image"]=> string(22) "/9/7/9780080472195.jpg" ["thumbnail"]=> string(22) "/9/7/9780080472195.jpg" ["image_label"]=> string(4) "CCTV" ["small_image_label"]=> string(4) "CCTV" ["thumbnail_label"]=> string(4) "CCTV" ["url_key"]=> string(4) "cctv" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(9) "cctv.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Closed circuit television (CCTV) is experiencing a leap in technology...

    Rating:
    0%
    £64.99
    Add to Wish List
  7. Securing Blockchain Networks like Ethereum and Hyperledger Fabric object(Magento\Catalog\Model\Product\Interceptor)#18136 (27) { ["entity_id"]=> string(5) "52835" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781838646455" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:02:51" ["updated_at"]=> string(19) "2025-07-24 08:02:51" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(65) "Securing Blockchain Networks like Ethereum and Hyperledger Fabric" ["image_label"]=> string(65) "Securing Blockchain Networks like Ethereum and Hyperledger Fabric" ["url_key"]=> string(65) "securing-blockchain-networks-like-ethereum-and-hyperledger-fabric" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey FeaturesExplore blockchain concepts such as cryptography, consensus algorithms, and securit" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(70) "securing-blockchain-networks-like-ethereum-and-hyperledger-fabric.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Build secure private blockchain networks to handle mission-critical security challenges...

    Rating:
    0%
    £25.99
    Add to Wish List
  8. Methodology to Improve Control Plane Security in SDN Environments object(Magento\Catalog\Model\Product\Interceptor)#18156 (27) { ["entity_id"]=> string(5) "53243" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9788770042192" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:09:23" ["updated_at"]=> string(19) "2025-07-24 08:09:23" ["price"]=> string(9) "69.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "69.990000" ["minimal_price"]=> string(9) "69.990000" ["min_price"]=> string(9) "69.990000" ["max_price"]=> string(9) "69.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(65) "Methodology to Improve Control Plane Security in SDN Environments" ["image_label"]=> string(65) "Methodology to Improve Control Plane Security in SDN Environments" ["url_key"]=> string(65) "methodology-to-improve-control-plane-security-in-sdn-environments" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book unveils a blueprint for safeguarding the very backbone of modern communication networks. It offers a roadmap towards fortifying SDN infrastructures against the relentless onslaught of cyber threats, ensuring resilience and reliability in an ever" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(70) "methodology-to-improve-control-plane-security-in-sdn-environments.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book unveils a blueprint for safeguarding the very backbone...

    Rating:
    0%
    £69.99
    Add to Wish List
  9. Multimedia Security Technologies for Digital Rights Management object(Magento\Catalog\Model\Product\Interceptor)#18155 (33) { ["entity_id"]=> string(5) "52217" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080463896" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:52:22" ["updated_at"]=> string(19) "2025-07-24 07:52:22" ["price"]=> string(9) "64.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "64.990000" ["minimal_price"]=> string(9) "64.990000" ["min_price"]=> string(9) "64.990000" ["max_price"]=> string(9) "64.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["image"]=> string(22) "/9/7/9780080463896.jpg" ["small_image"]=> string(22) "/9/7/9780080463896.jpg" ["thumbnail"]=> string(22) "/9/7/9780080463896.jpg" ["image_label"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["small_image_label"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["thumbnail_label"]=> string(62) "Multimedia Security Technologies for Digital Rights Management" ["url_key"]=> string(62) "multimedia-security-technologies-for-digital-rights-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and pro" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(67) "multimedia-security-technologies-for-digital-rights-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Security is a major concern in an increasingly multimedia-defined universe...

    Rating:
    0%
    £64.99
    Add to Wish List
  10. ASP.Net Web Developer's Guide object(Magento\Catalog\Model\Product\Interceptor)#18154 (33) { ["entity_id"]=> string(5) "55059" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080475943" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:39:51" ["updated_at"]=> string(19) "2025-07-24 08:39:51" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(29) "ASP.Net Web Developer's Guide" ["image"]=> string(22) "/9/7/9780080475943.jpg" ["small_image"]=> string(22) "/9/7/9780080475943.jpg" ["thumbnail"]=> string(22) "/9/7/9780080475943.jpg" ["image_label"]=> string(29) "ASP.Net Web Developer's Guide" ["small_image_label"]=> string(29) "ASP.Net Web Developer's Guide" ["thumbnail_label"]=> string(29) "ASP.Net Web Developer's Guide" ["url_key"]=> string(28) "aspnet-web-developer-s-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "ASP.Net Web Developer's Guide provides information to make use of Microsoft's newest Web development platform.ASP.NET is a revolutionary programming framework that enables the rapid development of powerful web applications and services. Part of the emergi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "aspnet-web-developer-s-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    ASP.Net Web Developer's Guide provides information to make use of...

    Rating:
    0%
    £31.99
    Add to Wish List
  11. ASP Configuration Handbook object(Magento\Catalog\Model\Product\Interceptor)#18153 (33) { ["entity_id"]=> string(5) "55058" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080475936" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:39:50" ["updated_at"]=> string(19) "2025-07-24 08:39:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(26) "ASP Configuration Handbook" ["image"]=> string(22) "/9/7/9780080475936.jpg" ["small_image"]=> string(22) "/9/7/9780080475936.jpg" ["thumbnail"]=> string(22) "/9/7/9780080475936.jpg" ["image_label"]=> string(26) "ASP Configuration Handbook" ["small_image_label"]=> string(26) "ASP Configuration Handbook" ["thumbnail_label"]=> string(26) "ASP Configuration Handbook" ["url_key"]=> string(26) "asp-configuration-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Understanding ASPs: The new Internet business.Application Service Providers (ASPs) appeal to small businesses by offering a wide variety of web-hosted software programs including e-commerce, communications, project management, financial, word processing a" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(31) "asp-configuration-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Understanding ASPs: The new Internet business.Application Service Providers (ASPs) appeal...

    Rating:
    0%
    £31.99
    Add to Wish List
  12. C#.Net Developer's Guide object(Magento\Catalog\Model\Product\Interceptor)#18152 (33) { ["entity_id"]=> string(5) "55213" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476360" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:30" ["updated_at"]=> string(19) "2025-07-24 08:42:30" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(24) "C#.Net Developer's Guide" ["image"]=> string(22) "/9/7/9780080476360.jpg" ["small_image"]=> string(22) "/9/7/9780080476360.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476360.jpg" ["image_label"]=> string(24) "C#.Net Developer's Guide" ["small_image_label"]=> string(24) "C#.Net Developer's Guide" ["thumbnail_label"]=> string(24) "C#.Net Developer's Guide" ["url_key"]=> string(23) "c-net-developer-s-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Microsoft's C# ("e;C sharp"e;) is a modern, object-oriented programming language built from the ground up to exploit the power of XML-based Web services on Microsoft's new .NET platform. With its Visual C++ development system heritage, C# will ena" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "c-net-developer-s-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft's C# ("e;C sharp"e;) is a modern, object-oriented programming language...

    Rating:
    0%
    £32.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. Cisco Security Professional's Guide to Secure Intrusion Detection Systems object(Magento\Catalog\Model\Product\Interceptor)#18151 (33) { ["entity_id"]=> string(5) "55232" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476544" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:53" ["updated_at"]=> string(19) "2025-07-24 08:42:53" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["image"]=> string(22) "/9/7/9780080476544.jpg" ["small_image"]=> string(22) "/9/7/9780080476544.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476544.jpg" ["image_label"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["small_image_label"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["thumbnail_label"]=> string(73) "Cisco Security Professional's Guide to Secure Intrusion Detection Systems" ["url_key"]=> string(73) "cisco-security-professional-s-guide-to-secure-intrusion-detection-systems" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Profes" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(78) "cisco-security-professional-s-guide-to-secure-intrusion-detection-systems.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cisco Systems, Inc. is the worldwide leader in networking for...

    Rating:
    0%
    £36.99
    Add to Wish List
  15. Configuring IPv6 For Cisco IOS object(Magento\Catalog\Model\Product\Interceptor)#18150 (33) { ["entity_id"]=> string(5) "55277" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476766" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:43:49" ["updated_at"]=> string(19) "2025-07-24 08:43:49" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(30) "Configuring IPv6 For Cisco IOS" ["image"]=> string(22) "/9/7/9780080476766.jpg" ["small_image"]=> string(22) "/9/7/9780080476766.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476766.jpg" ["image_label"]=> string(30) "Configuring IPv6 For Cisco IOS" ["small_image_label"]=> string(30) "Configuring IPv6 For Cisco IOS" ["thumbnail_label"]=> string(30) "Configuring IPv6 For Cisco IOS" ["url_key"]=> string(30) "configuring-ipv6-for-cisco-ios" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;By building IPv6 into Cisco IOS software, we are enabling continued growth of the Internet and its expansion into new applications and capabilities in a way that maintains compatibility with existing Internet services."e; -- Stephen Deering, Ci" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "configuring-ipv6-for-cisco-ios.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;By building IPv6 into Cisco IOS software, we are enabling...

    Rating:
    0%
    £44.99
    Add to Wish List
  16. C# For Java Programmers object(Magento\Catalog\Model\Product\Interceptor)#18149 (33) { ["entity_id"]=> string(5) "55205" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476353" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:22" ["updated_at"]=> string(19) "2025-07-24 08:42:22" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(23) "C# For Java Programmers" ["image"]=> string(22) "/9/7/9780080476353.jpg" ["small_image"]=> string(22) "/9/7/9780080476353.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476353.jpg" ["image_label"]=> string(23) "C# For Java Programmers" ["small_image_label"]=> string(23) "C# For Java Programmers" ["thumbnail_label"]=> string(23) "C# For Java Programmers" ["url_key"]=> string(22) "c-for-java-programmers" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your repertoire and marketability with C# for Java Progammers!C# for Java Programmers will prepare readers for the .NET framework by building on what they already know about object" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(27) "c-for-java-programmers.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your...

    Rating:
    0%
    £31.99
    Add to Wish List
  17. Checkpoint Next Generation Security Administration object(Magento\Catalog\Model\Product\Interceptor)#18148 (33) { ["entity_id"]=> string(5) "55220" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476452" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:40" ["updated_at"]=> string(19) "2025-07-24 08:42:40" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(50) "Checkpoint Next Generation Security Administration" ["image"]=> string(22) "/9/7/9780080476452.jpg" ["small_image"]=> string(22) "/9/7/9780080476452.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476452.jpg" ["image_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["small_image_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["thumbnail_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["url_key"]=> string(50) "checkpoint-next-generation-security-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enabl" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "checkpoint-next-generation-security-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Unparalleled security management that IT professionals have been waiting for.Check...

    Rating:
    0%
    £36.99
    Add to Wish List
  18. Best Damn Windows Server 2003 Book Period object(Magento\Catalog\Model\Product\Interceptor)#18147 (33) { ["entity_id"]=> string(5) "55089" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476070" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:40:28" ["updated_at"]=> string(19) "2025-07-24 08:40:28" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(41) "Best Damn Windows Server 2003 Book Period" ["image"]=> string(22) "/9/7/9780080476070.jpg" ["small_image"]=> string(22) "/9/7/9780080476070.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476070.jpg" ["image_label"]=> string(41) "Best Damn Windows Server 2003 Book Period" ["small_image_label"]=> string(41) "Best Damn Windows Server 2003 Book Period" ["thumbnail_label"]=> string(41) "Best Damn Windows Server 2003 Book Period" ["url_key"]=> string(41) "best-damn-windows-server-2003-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from W" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "best-damn-windows-server-2003-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In keeping with past trends, full migration to this latest...

    Rating:
    0%
    £37.99
    Add to Wish List
  19. Building CISCO Networks for Windows 2000 object(Magento\Catalog\Model\Product\Interceptor)#18146 (33) { ["entity_id"]=> string(5) "55107" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476131" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:40:46" ["updated_at"]=> string(19) "2025-07-24 08:40:46" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(40) "Building CISCO Networks for Windows 2000" ["image"]=> string(22) "/9/7/9780080476131.jpg" ["small_image"]=> string(22) "/9/7/9780080476131.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476131.jpg" ["image_label"]=> string(40) "Building CISCO Networks for Windows 2000" ["small_image_label"]=> string(40) "Building CISCO Networks for Windows 2000" ["thumbnail_label"]=> string(40) "Building CISCO Networks for Windows 2000" ["url_key"]=> string(40) "building-cisco-networks-for-windows-2000" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Act" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "building-cisco-networks-for-windows-2000.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft Corporation, the world's largest software vendor, and Cisco Systems,...

    Rating:
    0%
    £37.99
    Add to Wish List
  20. Configuring Cisco AVVID object(Magento\Catalog\Model\Product\Interceptor)#18145 (33) { ["entity_id"]=> string(5) "55274" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476735" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:43:45" ["updated_at"]=> string(19) "2025-07-24 08:43:45" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(23) "Configuring Cisco AVVID" ["image"]=> string(22) "/9/7/9780080476735.jpg" ["small_image"]=> string(22) "/9/7/9780080476735.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476735.jpg" ["image_label"]=> string(23) "Configuring Cisco AVVID" ["small_image_label"]=> string(23) "Configuring Cisco AVVID" ["thumbnail_label"]=> string(23) "Configuring Cisco AVVID" ["url_key"]=> string(23) "configuring-cisco-avvid" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "What is AVVID?Previously called Configuring Cisco Communications Networks (CCN), Architecture for Voice, Video, and Integrated Data (AVVID) is the latest development from Cisco Systems that will soon redefine the way businesses communicate. AVVID allows b" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "configuring-cisco-avvid.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    What is AVVID?Previously called Configuring Cisco Communications Networks (CCN), Architecture...

    Rating:
    0%
    £37.99
    Add to Wish List
  21. Google Hacking for Penetration Testers object(Magento\Catalog\Model\Product\Interceptor)#18144 (33) { ["entity_id"]=> string(5) "55312" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478050" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:44:31" ["updated_at"]=> string(19) "2025-07-24 08:54:41" ["price"]=> string(9) "28.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "28.990000" ["minimal_price"]=> string(9) "28.990000" ["min_price"]=> string(9) "28.990000" ["max_price"]=> string(9) "28.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(19) ["name"]=> string(38) "Google Hacking for Penetration Testers" ["image"]=> string(24) "/9/7/9780080478050_1.jpg" ["small_image"]=> string(24) "/9/7/9780080478050_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080478050_1.jpg" ["image_label"]=> string(38) "Google Hacking for Penetration Testers" ["small_image_label"]=> string(38) "Google Hacking for Penetration Testers" ["thumbnail_label"]=> string(38) "Google Hacking for Penetration Testers" ["url_key"]=> string(38) "google-hacking-for-penetration-testers" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. W" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "google-hacking-for-penetration-testers.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Google, the most popular search engine worldwide, provides web surfers...

    Rating:
    0%
    £28.99
    Add to Wish List
  22. Designing A Wireless Network object(Magento\Catalog\Model\Product\Interceptor)#18143 (33) { ["entity_id"]=> string(5) "55373" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477169" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:41" ["updated_at"]=> string(19) "2025-07-24 08:55:41" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(20) ["name"]=> string(28) "Designing A Wireless Network" ["image"]=> string(22) "/9/7/9780080477169.jpg" ["small_image"]=> string(22) "/9/7/9780080477169.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477169.jpg" ["image_label"]=> string(28) "Designing A Wireless Network" ["small_image_label"]=> string(28) "Designing A Wireless Network" ["thumbnail_label"]=> string(28) "Designing A Wireless Network" ["url_key"]=> string(28) "designing-a-wireless-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Business is on the move - mobile computing must keep up!Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wir" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "designing-a-wireless-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Business is on the move - mobile computing must keep...

    Rating:
    0%
    £30.99
    Add to Wish List
  23. MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297) object(Magento\Catalog\Model\Product\Interceptor)#18132 (33) { ["entity_id"]=> string(5) "55797" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479286" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:04:03" ["updated_at"]=> string(19) "2025-07-24 09:04:03" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(21) ["name"]=> string(93) "MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)" ["image"]=> string(22) "/9/7/9780080479286.jpg" ["small_image"]=> string(22) "/9/7/9780080479286.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479286.jpg" ["image_label"]=> string(93) "MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)" ["small_image_label"]=> string(93) "MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)" ["thumbnail_label"]=> string(93) "MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)" ["url_key"]=> string(92) "mcse-designing-a-windows-server-2003-active-directory-and-network-infrastructure-exam-70-297" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "MCSE Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure (Exam 70-297) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and rem" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(97) "mcse-designing-a-windows-server-2003-active-directory-and-network-infrastructure-exam-70-297.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    MCSE Designing a Microsoft Windows Server 2003 Active Directory and...

    Rating:
    0%
    £38.99
    Add to Wish List
  24. E-Mail Virus Protection Handbook object(Magento\Catalog\Model\Product\Interceptor)#18135 (33) { ["entity_id"]=> string(5) "55445" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477534" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:57:09" ["updated_at"]=> string(19) "2025-07-24 08:57:09" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(22) ["name"]=> string(32) "E-Mail Virus Protection Handbook" ["image"]=> string(22) "/9/7/9780080477534.jpg" ["small_image"]=> string(22) "/9/7/9780080477534.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477534.jpg" ["image_label"]=> string(32) "E-Mail Virus Protection Handbook" ["small_image_label"]=> string(32) "E-Mail Virus Protection Handbook" ["thumbnail_label"]=> string(32) "E-Mail Virus Protection Handbook" ["url_key"]=> string(32) "e-mail-virus-protection-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "e-mail-virus-protection-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The E-mail Virus Protection Handbook is organised around specific e-mail...

    Rating:
    0%
    £25.99
    Add to Wish List
  25. Enemy at the Water Cooler object(Magento\Catalog\Model\Product\Interceptor)#18141 (33) { ["entity_id"]=> string(5) "55475" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477602" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:57:39" ["updated_at"]=> string(19) "2025-07-24 08:57:39" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(23) ["name"]=> string(25) "Enemy at the Water Cooler" ["image"]=> string(22) "/9/7/9780080477602.jpg" ["small_image"]=> string(22) "/9/7/9780080477602.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477602.jpg" ["image_label"]=> string(25) "Enemy at the Water Cooler" ["small_image_label"]=> string(25) "Enemy at the Water Cooler" ["thumbnail_label"]=> string(25) "Enemy at the Water Cooler" ["url_key"]=> string(25) "enemy-at-the-water-cooler" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "enemy-at-the-water-cooler.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book covers a decade of work with some of...

    Rating:
    0%
    £32.99
    Add to Wish List
  26. Hack Proofing Your E-commerce Web Site object(Magento\Catalog\Model\Product\Interceptor)#18138 (33) { ["entity_id"]=> string(5) "55523" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478104" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:33" ["updated_at"]=> string(19) "2025-07-24 08:58:33" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(24) ["name"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["image"]=> string(22) "/9/7/9780080478104.jpg" ["small_image"]=> string(22) "/9/7/9780080478104.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478104.jpg" ["image_label"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["small_image_label"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["thumbnail_label"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["url_key"]=> string(38) "hack-proofing-your-e-commerce-web-site" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the authors of the bestselling Hack Proofing Your Network!Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and ma" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "hack-proofing-your-e-commerce-web-site.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the authors of the bestselling Hack Proofing Your Network!Yahoo!,...

    Rating:
    0%
    £31.99
    Add to Wish List
  27. Designing SQL Server 2000 Databases object(Magento\Catalog\Model\Product\Interceptor)#18133 (33) { ["entity_id"]=> string(5) "55378" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477190" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:47" ["updated_at"]=> string(19) "2025-07-24 08:55:47" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(25) ["name"]=> string(35) "Designing SQL Server 2000 Databases" ["image"]=> string(22) "/9/7/9780080477190.jpg" ["small_image"]=> string(22) "/9/7/9780080477190.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477190.jpg" ["image_label"]=> string(35) "Designing SQL Server 2000 Databases" ["small_image_label"]=> string(35) "Designing SQL Server 2000 Databases" ["thumbnail_label"]=> string(35) "Designing SQL Server 2000 Databases" ["url_key"]=> string(35) "designing-sql-server-2000-databases" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities of SQL Server 2000, one of the key components of .NE" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "designing-sql-server-2000-databases.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Microsoft .NET initiative is the future of e-commerce -...

    Rating:
    0%
    £31.99
    Add to Wish List
  28. Hack Proofing XML object(Magento\Catalog\Model\Product\Interceptor)#18142 (33) { ["entity_id"]=> string(5) "55540" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478159" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:53" ["updated_at"]=> string(19) "2025-07-24 08:58:53" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(26) ["name"]=> string(17) "Hack Proofing XML" ["image"]=> string(22) "/9/7/9780080478159.jpg" ["small_image"]=> string(22) "/9/7/9780080478159.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478159.jpg" ["image_label"]=> string(17) "Hack Proofing XML" ["small_image_label"]=> string(17) "Hack Proofing XML" ["thumbnail_label"]=> string(17) "Hack Proofing XML" ["url_key"]=> string(17) "hack-proofing-xml" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "hack-proofing-xml.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £31.99
    Add to Wish List
  29. Hardware Hacking object(Magento\Catalog\Model\Product\Interceptor)#18119 (33) { ["entity_id"]=> string(5) "55568" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478258" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:59:29" ["updated_at"]=> string(19) "2025-07-24 08:59:29" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(27) ["name"]=> string(16) "Hardware Hacking" ["image"]=> string(22) "/9/7/9780080478258.jpg" ["small_image"]=> string(22) "/9/7/9780080478258.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478258.jpg" ["image_label"]=> string(16) "Hardware Hacking" ["small_image_label"]=> string(16) "Hardware Hacking" ["thumbnail_label"]=> string(16) "Hardware Hacking" ["url_key"]=> string(16) "hardware-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;If I had this book 10 years ago, the FBI would never have found me!"e; -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "e;gadget geek."e;" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "hardware-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;If I had this book 10 years ago, the FBI...

    Rating:
    0%
    £25.99
    Add to Wish List
  30. MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) object(Magento\Catalog\Model\Product\Interceptor)#18140 (33) { ["entity_id"]=> string(5) "55787" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479279" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:03:50" ["updated_at"]=> string(19) "2025-07-24 09:03:50" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(28) ["name"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["image"]=> string(22) "/9/7/9780080479279.jpg" ["small_image"]=> string(22) "/9/7/9780080479279.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479279.jpg" ["image_label"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["small_image_label"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["thumbnail_label"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["url_key"]=> string(69) "mcse-designing-security-for-a-windows-server-2003-network-exam-70-298" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "MCSE Designing Security for a Microsoft Windows Server 2003 Network (Exam 70-298) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system g" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(74) "mcse-designing-security-for-a-windows-server-2003-network-exam-70-298.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    MCSE Designing Security for a Microsoft Windows Server 2003 Network...

    Rating:
    0%
    £39.99
    Add to Wish List
  31. Programmer's Ultimate Security DeskRef object(Magento\Catalog\Model\Product\Interceptor)#18644 (33) { ["entity_id"]=> string(5) "56100" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480459" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:09:55" ["updated_at"]=> string(19) "2025-07-24 09:09:55" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(29) ["name"]=> string(38) "Programmer's Ultimate Security DeskRef" ["image"]=> string(22) "/9/7/9780080480459.jpg" ["small_image"]=> string(22) "/9/7/9780080480459.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480459.jpg" ["image_label"]=> string(38) "Programmer's Ultimate Security DeskRef" ["small_image_label"]=> string(38) "Programmer's Ultimate Security DeskRef" ["thumbnail_label"]=> string(38) "Programmer's Ultimate Security DeskRef" ["url_key"]=> string(38) "programmer-s-ultimate-security-deskref" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use.While there are many books " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "programmer-s-ultimate-security-deskref.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Programmer's Ultimate Security DeskRef is the only complete desk...

    Rating:
    0%
    £32.99
    Add to Wish List
  32. Richard Thieme's Islands in the Clickstream object(Magento\Catalog\Model\Product\Interceptor)#18645 (33) { ["entity_id"]=> string(5) "56128" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480701" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:10:29" ["updated_at"]=> string(19) "2025-07-24 09:10:29" ["price"]=> string(9) "18.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "18.990000" ["minimal_price"]=> string(9) "18.990000" ["min_price"]=> string(9) "18.990000" ["max_price"]=> string(9) "18.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(30) ["name"]=> string(43) "Richard Thieme's Islands in the Clickstream" ["image"]=> string(22) "/9/7/9780080480701.jpg" ["small_image"]=> string(22) "/9/7/9780080480701.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480701.jpg" ["image_label"]=> string(43) "Richard Thieme's Islands in the Clickstream" ["small_image_label"]=> string(43) "Richard Thieme's Islands in the Clickstream" ["thumbnail_label"]=> string(43) "Richard Thieme's Islands in the Clickstream" ["url_key"]=> string(43) "richard-thieme-s-islands-in-the-clickstream" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "CNN called Richard Thieme "e;a member of the cyber avant-garde"e;. Digital Delirium named him "e;one of the most creative minds of the digital generation"e;. Now Richard Thieme's wisdom on the social and cultural dimensions of technology i" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "richard-thieme-s-islands-in-the-clickstream.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    CNN called Richard Thieme "e;a member of the cyber avant-garde"e;....

    Rating:
    0%
    £18.99
    Add to Wish List
  33. Rick Gallahers MPLS Training Guide object(Magento\Catalog\Model\Product\Interceptor)#18647 (33) { ["entity_id"]=> string(5) "56129" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480718" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:10:31" ["updated_at"]=> string(19) "2025-07-24 09:10:31" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(31) ["name"]=> string(34) "Rick Gallahers MPLS Training Guide" ["image"]=> string(22) "/9/7/9780080480718.jpg" ["small_image"]=> string(22) "/9/7/9780080480718.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480718.jpg" ["image_label"]=> string(34) "Rick Gallahers MPLS Training Guide" ["small_image_label"]=> string(34) "Rick Gallahers MPLS Training Guide" ["thumbnail_label"]=> string(34) "Rick Gallahers MPLS Training Guide" ["url_key"]=> string(34) "rick-gallahers-mpls-training-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Rick Gallahers MPLS Training Guide introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. It discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, lab" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "rick-gallahers-mpls-training-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Rick Gallahers MPLS Training Guide introduces readers to mpls concepts,...

    Rating:
    0%
    £38.99
    Add to Wish List
  34. Snort Intrusion Detection 2.0 object(Magento\Catalog\Model\Product\Interceptor)#18651 (33) { ["entity_id"]=> string(5) "56194" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481005" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:48" ["updated_at"]=> string(19) "2025-07-24 09:11:48" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(32) ["name"]=> string(29) "Snort Intrusion Detection 2.0" ["image"]=> string(22) "/9/7/9780080481005.jpg" ["small_image"]=> string(22) "/9/7/9780080481005.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481005.jpg" ["image_label"]=> string(29) "Snort Intrusion Detection 2.0" ["small_image_label"]=> string(29) "Snort Intrusion Detection 2.0" ["thumbnail_label"]=> string(29) "Snort Intrusion Detection 2.0" ["url_key"]=> string(28) "snort-intrusion-detection-20" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "snort-intrusion-detection-20.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The incredible low maintenance costs of Snort combined with its...

    Rating:
    0%
    £32.99
    Add to Wish List
  35. Scene of the Cybercrime object(Magento\Catalog\Model\Product\Interceptor)#18650 (33) { ["entity_id"]=> string(5) "56438" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080486994" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:15:46" ["updated_at"]=> string(19) "2025-07-24 09:15:46" ["price"]=> string(9) "34.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "34.990000" ["minimal_price"]=> string(9) "34.990000" ["min_price"]=> string(9) "34.990000" ["max_price"]=> string(9) "34.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(33) ["name"]=> string(23) "Scene of the Cybercrime" ["image"]=> string(22) "/9/7/9780080486994.jpg" ["small_image"]=> string(22) "/9/7/9780080486994.jpg" ["thumbnail"]=> string(22) "/9/7/9780080486994.jpg" ["image_label"]=> string(23) "Scene of the Cybercrime" ["small_image_label"]=> string(23) "Scene of the Cybercrime" ["thumbnail_label"]=> string(23) "Scene of the Cybercrime" ["url_key"]=> string(23) "scene-of-the-cybercrime" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. Wh" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "scene-of-the-cybercrime.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    When it comes to computer crimes, the criminals got a...

    Rating:
    0%
    £34.99
    Add to Wish List
  36. Scene of the Cybercrime: Computer Forensics Handbook object(Magento\Catalog\Model\Product\Interceptor)#18652 (33) { ["entity_id"]=> string(5) "56169" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480787" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:14" ["updated_at"]=> string(19) "2025-07-24 09:11:14" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(34) ["name"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["image"]=> string(22) "/9/7/9780080480787.jpg" ["small_image"]=> string(22) "/9/7/9780080480787.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480787.jpg" ["image_label"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["small_image_label"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["thumbnail_label"]=> string(52) "Scene of the Cybercrime: Computer Forensics Handbook" ["url_key"]=> string(51) "scene-of-the-cybercrime-computer-forensics-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."e; - Hans Christian Kruger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has give" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(56) "scene-of-the-cybercrime-computer-forensics-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;Cybercrime and cyber-terrorism represent a serious challenge to society as...

    Rating:
    0%
    £37.99
    Add to Wish List
  37. Webmasters Guide To The Wireless Internet object(Magento\Catalog\Model\Product\Interceptor)#18653 (33) { ["entity_id"]=> string(5) "56426" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481715" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:15:35" ["updated_at"]=> string(19) "2025-07-24 09:15:35" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(35) ["name"]=> string(41) "Webmasters Guide To The Wireless Internet" ["image"]=> string(22) "/9/7/9780080481715.jpg" ["small_image"]=> string(22) "/9/7/9780080481715.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481715.jpg" ["image_label"]=> string(41) "Webmasters Guide To The Wireless Internet" ["small_image_label"]=> string(41) "Webmasters Guide To The Wireless Internet" ["thumbnail_label"]=> string(41) "Webmasters Guide To The Wireless Internet" ["url_key"]=> string(41) "webmasters-guide-to-the-wireless-internet" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The wireless Web is a reality - don't get left behind!The wireless Web is not a future dream. It is here today. Already, more than 20 million people have access the Internet through PDAs, mobile phones, pagers and other wireless devices. What will people" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "webmasters-guide-to-the-wireless-internet.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The wireless Web is a reality - don't get left...

    Rating:
    0%
    £31.99
    Add to Wish List
  38. VB.Net Web Developer's Guide object(Magento\Catalog\Model\Product\Interceptor)#18654 (33) { ["entity_id"]=> string(5) "56276" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481593" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:13:25" ["updated_at"]=> string(19) "2025-07-24 09:13:25" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(36) ["name"]=> string(28) "VB.Net Web Developer's Guide" ["image"]=> string(22) "/9/7/9780080481593.jpg" ["small_image"]=> string(22) "/9/7/9780080481593.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481593.jpg" ["image_label"]=> string(28) "VB.Net Web Developer's Guide" ["small_image_label"]=> string(28) "VB.Net Web Developer's Guide" ["thumbnail_label"]=> string(28) "VB.Net Web Developer's Guide" ["url_key"]=> string(27) "vbnet-web-developer-s-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Visual Basic has long been the language of choice when designing Windows-based applications and the Web. Touted as both the most popular and productive computing language, Visual Basic has amassed quite a following of devoted programmers, and is a sought " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(32) "vbnet-web-developer-s-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Visual Basic has long been the language of choice when...

    Rating:
    0%
    £31.99
    Add to Wish List
  39. ISO27001 in a Windows Environment object(Magento\Catalog\Model\Product\Interceptor)#18655 (27) { ["entity_id"]=> string(5) "56615" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781849286053" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:19:21" ["updated_at"]=> string(19) "2025-07-24 09:19:21" ["price"]=> string(9) "39.950000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.950000" ["minimal_price"]=> string(9) "39.950000" ["min_price"]=> string(9) "39.950000" ["max_price"]=> string(9) "39.950000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(37) ["name"]=> string(33) "ISO27001 in a Windows Environment" ["image_label"]=> string(33) "ISO27001 in a Windows Environment" ["url_key"]=> string(33) "iso27001-in-a-windows-environment" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Bridging the gap between ISO27001 and Windows(R) securityMost ISO27001 implementations will involve a Windows environment at some level. The different approaches to security, however, mean that there is often a knowledge gap between those trying to imple" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "iso27001-in-a-windows-environment.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Bridging the gap between ISO27001 and Windows(R) securityMost ISO27001 implementations...

    Rating:
    0%
    £39.95
    Add to Wish List
  40. Configuring VMware ESX Server 2.5 object(Magento\Catalog\Model\Product\Interceptor)#18656 (33) { ["entity_id"]=> string(5) "56668" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488578" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:20:29" ["updated_at"]=> string(19) "2025-07-24 09:20:29" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(38) ["name"]=> string(33) "Configuring VMware ESX Server 2.5" ["image"]=> string(22) "/9/7/9780080488578.jpg" ["small_image"]=> string(22) "/9/7/9780080488578.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488578.jpg" ["image_label"]=> string(33) "Configuring VMware ESX Server 2.5" ["small_image_label"]=> string(33) "Configuring VMware ESX Server 2.5" ["thumbnail_label"]=> string(33) "Configuring VMware ESX Server 2.5" ["url_key"]=> string(32) "configuring-vmware-esx-server-25" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "configuring-vmware-esx-server-25.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book will detail the default and custom installation of...

    Rating:
    0%
    £31.99
    Add to Wish List
  41. Firewalls object(Magento\Catalog\Model\Product\Interceptor)#18657 (33) { ["entity_id"]=> string(5) "57849" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491325" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:41:39" ["updated_at"]=> string(19) "2025-07-24 09:41:39" ["price"]=> string(9) "49.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "49.990000" ["minimal_price"]=> string(9) "49.990000" ["min_price"]=> string(9) "49.990000" ["max_price"]=> string(9) "49.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(39) ["name"]=> string(9) "Firewalls" ["image"]=> string(22) "/9/7/9780080491325.jpg" ["small_image"]=> string(22) "/9/7/9780080491325.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491325.jpg" ["image_label"]=> string(9) "Firewalls" ["small_image_label"]=> string(9) "Firewalls" ["thumbnail_label"]=> string(9) "Firewalls" ["url_key"]=> string(9) "firewalls" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall v" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(14) "firewalls.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In this book, you will gain extensive hands-on experience installing...

    Rating:
    0%
    £49.99
    Add to Wish List
  42. Information Systems Security Officer's Guide object(Magento\Catalog\Model\Product\Interceptor)#18658 (33) { ["entity_id"]=> string(5) "57901" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491530" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:42:35" ["updated_at"]=> string(19) "2025-07-24 09:42:35" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(40) ["name"]=> string(44) "Information Systems Security Officer's Guide" ["image"]=> string(22) "/9/7/9780080491530.jpg" ["small_image"]=> string(22) "/9/7/9780080491530.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491530.jpg" ["image_label"]=> string(44) "Information Systems Security Officer's Guide" ["small_image_label"]=> string(44) "Information Systems Security Officer's Guide" ["thumbnail_label"]=> string(44) "Information Systems Security Officer's Guide" ["url_key"]=> string(44) "information-systems-security-officer-s-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "information-systems-security-officer-s-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Information systems security continues to grow and change based on...

    Rating:
    0%
    £36.99
    Add to Wish List
  43. Microsoft Windows Security Fundamentals object(Magento\Catalog\Model\Product\Interceptor)#18659 (33) { ["entity_id"]=> string(5) "57989" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491882" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:44:11" ["updated_at"]=> string(19) "2025-07-24 09:44:11" ["price"]=> string(9) "56.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "56.990000" ["minimal_price"]=> string(9) "56.990000" ["min_price"]=> string(9) "56.990000" ["max_price"]=> string(9) "56.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(41) ["name"]=> string(39) "Microsoft Windows Security Fundamentals" ["image"]=> string(22) "/9/7/9780080491882.jpg" ["small_image"]=> string(22) "/9/7/9780080491882.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491882.jpg" ["image_label"]=> string(39) "Microsoft Windows Security Fundamentals" ["small_image_label"]=> string(39) "Microsoft Windows Security Fundamentals" ["thumbnail_label"]=> string(39) "Microsoft Windows Security Fundamentals" ["url_key"]=> string(39) "microsoft-windows-security-fundamentals" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "microsoft-windows-security-fundamentals.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the first of two books serving as an...

    Rating:
    0%
    £56.99
    Add to Wish List
  44. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals object(Magento\Catalog\Model\Product\Interceptor)#18660 (33) { ["entity_id"]=> string(5) "56898" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489728" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:51" ["updated_at"]=> string(19) "2025-07-24 09:24:51" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(42) ["name"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["image"]=> string(22) "/9/7/9780080489728.jpg" ["small_image"]=> string(22) "/9/7/9780080489728.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489728.jpg" ["image_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["small_image_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["thumbnail_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["url_key"]=> string(108) "sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyo" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(113) "sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book is logically divided into 5 main categories with...

    Rating:
    0%
    £31.99
    Add to Wish List
  45. Hacking a Terror Network: The Silent Threat of Covert Channels object(Magento\Catalog\Model\Product\Interceptor)#18661 (33) { ["entity_id"]=> string(5) "56726" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488882" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:40" ["updated_at"]=> string(19) "2025-07-24 09:21:40" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(43) ["name"]=> string(62) "Hacking a Terror Network: The Silent Threat of Covert Channels" ["image"]=> string(22) "/9/7/9780080488882.jpg" ["small_image"]=> string(22) "/9/7/9780080488882.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488882.jpg" ["image_label"]=> string(62) "Hacking a Terror Network: The Silent Threat of Covert Channels" ["small_image_label"]=> string(62) "Hacking a Terror Network: The Silent Threat of Covert Channels" ["thumbnail_label"]=> string(62) "Hacking a Terror Network: The Silent Threat of Covert Channels" ["url_key"]=> string(61) "hacking-a-terror-network-the-silent-threat-of-covert-channels" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "e;insider's look"e; i" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(66) "hacking-a-terror-network-the-silent-threat-of-covert-channels.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by a certified Arabic linguist from the Defense Language...

    Rating:
    0%
    £25.99
    Add to Wish List
  46. How to Cheat at IT Project Management object(Magento\Catalog\Model\Product\Interceptor)#18662 (33) { ["entity_id"]=> string(5) "56784" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488974" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:22:45" ["updated_at"]=> string(19) "2025-07-24 09:22:45" ["price"]=> string(9) "28.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "28.990000" ["minimal_price"]=> string(9) "28.990000" ["min_price"]=> string(9) "28.990000" ["max_price"]=> string(9) "28.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(44) ["name"]=> string(37) "How to Cheat at IT Project Management" ["image"]=> string(22) "/9/7/9780080488974.jpg" ["small_image"]=> string(22) "/9/7/9780080488974.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488974.jpg" ["image_label"]=> string(37) "How to Cheat at IT Project Management" ["small_image_label"]=> string(37) "How to Cheat at IT Project Management" ["thumbnail_label"]=> string(37) "How to Cheat at IT Project Management" ["url_key"]=> string(37) "how-to-cheat-at-it-project-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Ins" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "how-to-cheat-at-it-project-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is written with the IT professional in mind....

    Rating:
    0%
    £28.99
    Add to Wish List
  47. Classical and Modern Cryptography for Beginners object(Magento\Catalog\Model\Product\Interceptor)#18663 (27) { ["entity_id"]=> string(5) "57112" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031329593" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:28:54" ["updated_at"]=> string(19) "2025-07-24 09:28:54" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(45) ["name"]=> string(47) "Classical and Modern Cryptography for Beginners" ["image_label"]=> string(47) "Classical and Modern Cryptography for Beginners" ["url_key"]=> string(47) "classical-and-modern-cryptography-for-beginners" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.  It also provides the information on the cryptography and a cryptosystem used by " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(52) "classical-and-modern-cryptography-for-beginners.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This textbook offers the knowledge and the mathematical background or...

    Rating:
    0%
    £54.99
    Add to Wish List
  48. Quiet Crypto Revolution object(Magento\Catalog\Model\Product\Interceptor)#18664 (27) { ["entity_id"]=> string(5) "58651" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484296271" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:55:57" ["updated_at"]=> string(19) "2025-07-24 11:55:57" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(46) ["name"]=> string(23) "Quiet Crypto Revolution" ["image_label"]=> string(23) "Quiet Crypto Revolution" ["url_key"]=> string(23) "quiet-crypto-revolution" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Crypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible languag" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "quiet-crypto-revolution.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Crypto is going to change the world, and for those...

    Rating:
    0%
    £19.99
    Add to Wish List
  49. Lecture Notes in Computer Science object(Magento\Catalog\Model\Product\Interceptor)#18665 (30) { ["entity_id"]=> string(5) "48450" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783030127862" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 13:04:02" ["updated_at"]=> string(19) "2025-07-24 11:48:53" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(47) ["name"]=> string(33) "Lecture Notes in Computer Science" ["image"]=> string(18) "/9783030127862.jpg" ["small_image"]=> string(18) "/9783030127862.jpg" ["thumbnail"]=> string(18) "/9783030127862.jpg" ["image_label"]=> string(33) "Lecture Notes in Computer Science" ["url_key"]=> string(33) "lecture-notes-in-computer-science" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Pri" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "lecture-notes-in-computer-science.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book constitutes the thoroughly refereed post-conference proceedings of the...

    Rating:
    0%
    £44.99
    Add to Wish List
  50. Designing and Building Enterprise DMZs object(Magento\Catalog\Model\Product\Interceptor)#18666 (33) { ["entity_id"]=> string(5) "59423" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080504001" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:09:45" ["updated_at"]=> string(19) "2025-07-24 12:09:45" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(48) ["name"]=> string(38) "Designing and Building Enterprise DMZs" ["image"]=> string(22) "/9/7/9780080504001.jpg" ["small_image"]=> string(22) "/9/7/9780080504001.jpg" ["thumbnail"]=> string(22) "/9/7/9780080504001.jpg" ["image_label"]=> string(38) "Designing and Building Enterprise DMZs" ["small_image_label"]=> string(38) "Designing and Building Enterprise DMZs" ["thumbnail_label"]=> string(38) "Designing and Building Enterprise DMZs" ["url_key"]=> string(38) "designing-and-building-enterprise-dmzs" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.One of the most complicated areas of network techno" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "designing-and-building-enterprise-dmzs.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only book available on building network DMZs,...

    Rating:
    0%
    £37.99
    Add to Wish List
  51. FISMA Certification and Accreditation Handbook object(Magento\Catalog\Model\Product\Interceptor)#18667 (33) { ["entity_id"]=> string(5) "59846" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080506531" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:18:52" ["updated_at"]=> string(19) "2025-07-24 12:18:52" ["price"]=> string(9) "42.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "42.990000" ["minimal_price"]=> string(9) "42.990000" ["min_price"]=> string(9) "42.990000" ["max_price"]=> string(9) "42.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(49) ["name"]=> string(46) "FISMA Certification and Accreditation Handbook" ["image"]=> string(22) "/9/7/9780080506531.jpg" ["small_image"]=> string(22) "/9/7/9780080506531.jpg" ["thumbnail"]=> string(22) "/9/7/9780080506531.jpg" ["image_label"]=> string(46) "FISMA Certification and Accreditation Handbook" ["small_image_label"]=> string(46) "FISMA Certification and Accreditation Handbook" ["thumbnail_label"]=> string(46) "FISMA Certification and Accreditation Handbook" ["url_key"]=> string(46) "fisma-certification-and-accreditation-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Cer" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(51) "fisma-certification-and-accreditation-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only book that instructs IT Managers to adhere to...

    Rating:
    0%
    £42.99
    Add to Wish List
  52. Cybersecurity Operations Handbook object(Magento\Catalog\Model\Product\Interceptor)#18668 (33) { ["entity_id"]=> string(5) "62745" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080530185" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 13:25:38" ["updated_at"]=> string(19) "2025-07-24 13:25:38" ["price"]=> string(9) "88.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "88.000000" ["minimal_price"]=> string(9) "88.000000" ["min_price"]=> string(9) "88.000000" ["max_price"]=> string(9) "88.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(50) ["name"]=> string(33) "Cybersecurity Operations Handbook" ["image"]=> string(22) "/9/7/9780080530185.jpg" ["small_image"]=> string(22) "/9/7/9780080530185.jpg" ["thumbnail"]=> string(22) "/9/7/9780080530185.jpg" ["image_label"]=> string(33) "Cybersecurity Operations Handbook" ["small_image_label"]=> string(33) "Cybersecurity Operations Handbook" ["thumbnail_label"]=> string(33) "Cybersecurity Operations Handbook" ["url_key"]=> string(33) "cybersecurity-operations-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "cybersecurity-operations-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cybersecurity Operations Handbook is the first book for daily operations...

    Rating:
    0%
    £88.00
    Add to Wish List
  53. Implementing Homeland Security for Enterprise IT object(Magento\Catalog\Model\Product\Interceptor)#18669 (33) { ["entity_id"]=> string(5) "60029" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080508504" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:23:34" ["updated_at"]=> string(19) "2025-07-24 12:23:34" ["price"]=> string(9) "42.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "42.990000" ["minimal_price"]=> string(9) "42.990000" ["min_price"]=> string(9) "42.990000" ["max_price"]=> string(9) "42.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(51) ["name"]=> string(48) "Implementing Homeland Security for Enterprise IT" ["image"]=> string(22) "/9/7/9780080508504.jpg" ["small_image"]=> string(22) "/9/7/9780080508504.jpg" ["thumbnail"]=> string(22) "/9/7/9780080508504.jpg" ["image_label"]=> string(48) "Implementing Homeland Security for Enterprise IT" ["small_image_label"]=> string(48) "Implementing Homeland Security for Enterprise IT" ["thumbnail_label"]=> string(48) "Implementing Homeland Security for Enterprise IT" ["url_key"]=> string(48) "implementing-homeland-security-for-enterprise-it" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "implementing-homeland-security-for-enterprise-it.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book shows what IT in organizations need to accomplish...

    Rating:
    0%
    £42.99
    Add to Wish List
  54. Information Assurance object(Magento\Catalog\Model\Product\Interceptor)#18670 (33) { ["entity_id"]=> string(5) "60047" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080508719" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:23:58" ["updated_at"]=> string(19) "2025-07-24 12:23:58" ["price"]=> string(9) "48.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "48.990000" ["minimal_price"]=> string(9) "48.990000" ["min_price"]=> string(9) "48.990000" ["max_price"]=> string(9) "48.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(52) ["name"]=> string(21) "Information Assurance" ["image"]=> string(22) "/9/7/9780080508719.jpg" ["small_image"]=> string(22) "/9/7/9780080508719.jpg" ["thumbnail"]=> string(22) "/9/7/9780080508719.jpg" ["image_label"]=> string(21) "Information Assurance" ["small_image_label"]=> string(21) "Information Assurance" ["thumbnail_label"]=> string(21) "Information Assurance" ["url_key"]=> string(21) "information-assurance" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC profess" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(26) "information-assurance.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by two INFOSEC experts, this book provides a systematic...

    Rating:
    0%
    £48.99
    Add to Wish List
  55. Internet Security object(Magento\Catalog\Model\Product\Interceptor)#18671 (33) { ["entity_id"]=> string(5) "60068" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080509075" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:24:27" ["updated_at"]=> string(19) "2025-07-24 12:24:27" ["price"]=> string(9) "51.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "51.990000" ["minimal_price"]=> string(9) "51.990000" ["min_price"]=> string(9) "51.990000" ["max_price"]=> string(9) "51.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(53) ["name"]=> string(17) "Internet Security" ["image"]=> string(22) "/9/7/9780080509075.jpg" ["small_image"]=> string(22) "/9/7/9780080509075.jpg" ["thumbnail"]=> string(22) "/9/7/9780080509075.jpg" ["image_label"]=> string(17) "Internet Security" ["small_image_label"]=> string(17) "Internet Security" ["thumbnail_label"]=> string(17) "Internet Security" ["url_key"]=> string(17) "internet-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resul" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "internet-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Internet Security incorporates not only the technology needed to support...

    Rating:
    0%
    £51.99
    Add to Wish List
  56. Scripting VMware Power Tools: Automating Virtual Infrastructure Administration object(Magento\Catalog\Model\Product\Interceptor)#18672 (33) { ["entity_id"]=> string(5) "60210" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080516776" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:27:36" ["updated_at"]=> string(19) "2025-07-24 12:27:36" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(54) ["name"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["image"]=> string(22) "/9/7/9780080516776.jpg" ["small_image"]=> string(22) "/9/7/9780080516776.jpg" ["thumbnail"]=> string(22) "/9/7/9780080516776.jpg" ["image_label"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["small_image_label"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["thumbnail_label"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["url_key"]=> string(77) "scripting-vmware-power-tools-automating-virtual-infrastructure-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then dis" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(82) "scripting-vmware-power-tools-automating-virtual-infrastructure-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book contains simple and advanced scripting using both ESX...

    Rating:
    0%
    £31.99
    Add to Wish List
  57. How to Cheat at Windows System Administration Using Command Line Scripts object(Magento\Catalog\Model\Product\Interceptor)#18673 (33) { ["entity_id"]=> string(5) "60000" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080508269" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:22:53" ["updated_at"]=> string(19) "2025-07-24 12:22:53" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(55) ["name"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["image"]=> string(22) "/9/7/9780080508269.jpg" ["small_image"]=> string(22) "/9/7/9780080508269.jpg" ["thumbnail"]=> string(22) "/9/7/9780080508269.jpg" ["image_label"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["small_image_label"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["thumbnail_label"]=> string(72) "How to Cheat at Windows System Administration Using Command Line Scripts" ["url_key"]=> string(72) "how-to-cheat-at-windows-system-administration-using-command-line-scripts" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of W" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(77) "how-to-cheat-at-windows-system-administration-using-command-line-scripts.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    How to Cheat at Windows Systems Administrators using Command Line...

    Rating:
    0%
    £25.99
    Add to Wish List
  58. Transactions on Computer Systems and Networks object(Magento\Catalog\Model\Product\Interceptor)#18674 (27) { ["entity_id"]=> string(5) "60095" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9789819713028" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:25:08" ["updated_at"]=> string(19) "2025-07-24 12:25:08" ["price"]=> string(10) "179.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "179.990000" ["minimal_price"]=> string(10) "179.990000" ["min_price"]=> string(10) "179.990000" ["max_price"]=> string(10) "179.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(56) ["name"]=> string(45) "Transactions on Computer Systems and Networks" ["image_label"]=> string(45) "Transactions on Computer Systems and Networks" ["url_key"]=> string(45) "transactions-on-computer-systems-and-networks" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "The book focuses on a very important area of Smart Grids - cyber security. It deals in particular with the tools and techniques for cyber security analysis of the Smart Grid control systems. This includes the standards and guidelines, detailed vulnerabili" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "transactions-on-computer-systems-and-networks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book focuses on a very important area of Smart...

    Rating:
    0%
    £179.99
    Add to Wish List
  59. RFID+ Study Guide and Practice Exams object(Magento\Catalog\Model\Product\Interceptor)#18675 (33) { ["entity_id"]=> string(5) "60272" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080516295" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:29:00" ["updated_at"]=> string(19) "2025-07-24 12:29:00" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(57) ["name"]=> string(36) "RFID+ Study Guide and Practice Exams" ["image"]=> string(22) "/9/7/9780080516295.jpg" ["small_image"]=> string(22) "/9/7/9780080516295.jpg" ["thumbnail"]=> string(22) "/9/7/9780080516295.jpg" ["image_label"]=> string(36) "RFID+ Study Guide and Practice Exams" ["small_image_label"]=> string(36) "RFID+ Study Guide and Practice Exams" ["thumbnail_label"]=> string(36) "RFID+ Study Guide and Practice Exams" ["url_key"]=> string(35) "rfid-study-guide-and-practice-exams" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a guide to CompTIA's new RFID+ Security exam and includes " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "rfid-study-guide-and-practice-exams.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Radio Frequency Identification (RFID) is an automatic identification method, relying...

    Rating:
    0%
    £25.99
    Add to Wish List
  60. Computational Intelligence Applications in Cyber Security object(Magento\Catalog\Model\Product\Interceptor)#18677 (33) { ["entity_id"]=> string(5) "61300" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781040135136" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:52:43" ["updated_at"]=> string(19) "2025-07-24 12:52:43" ["price"]=> string(9) "49.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "49.990000" ["minimal_price"]=> string(9) "49.990000" ["min_price"]=> string(9) "49.990000" ["max_price"]=> string(9) "49.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(59) ["name"]=> string(57) "Computational Intelligence Applications in Cyber Security" ["image"]=> string(22) "/9/7/9781040135136.jpg" ["small_image"]=> string(22) "/9/7/9781040135136.jpg" ["thumbnail"]=> string(22) "/9/7/9781040135136.jpg" ["image_label"]=> string(57) "Computational Intelligence Applications in Cyber Security" ["small_image_label"]=> string(57) "Computational Intelligence Applications in Cyber Security" ["thumbnail_label"]=> string(57) "Computational Intelligence Applications in Cyber Security" ["url_key"]=> string(57) "computational-intelligence-applications-in-cyber-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book provides a comprehensive overview of cyber security in Industry 5.0, data security in emerging technologies, block chain technology, cloud computing security, evolving IoT and OT threats, and considerable data integrity in healthcare. The impact " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(62) "computational-intelligence-applications-in-cyber-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book provides a comprehensive overview of cyber security in...

    Rating:
    0%
    £49.99
    Add to Wish List
  61. Android Forensics object(Magento\Catalog\Model\Product\Interceptor)#18678 (27) { ["entity_id"]=> string(5) "64382" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781597496520" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:01:06" ["updated_at"]=> string(19) "2025-07-24 14:01:06" ["price"]=> string(9) "42.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "42.990000" ["minimal_price"]=> string(9) "42.990000" ["min_price"]=> string(9) "42.990000" ["max_price"]=> string(9) "42.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(60) ["name"]=> string(17) "Android Forensics" ["image_label"]=> string(17) "Android Forensics" ["url_key"]=> string(17) "android-forensics" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, inc" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "android-forensics.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Android Forensics: Investigation, Analysis, and Mobile Security for Google Android...

    Rating:
    0%
    £42.99
    Add to Wish List
  62. IP Addressing and Subnetting INC IPV6 object(Magento\Catalog\Model\Product\Interceptor)#18679 (33) { ["entity_id"]=> string(5) "64237" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080535227" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 13:58:08" ["updated_at"]=> string(19) "2025-07-24 13:58:08" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(61) ["name"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["image"]=> string(22) "/9/7/9780080535227.jpg" ["small_image"]=> string(22) "/9/7/9780080535227.jpg" ["thumbnail"]=> string(22) "/9/7/9780080535227.jpg" ["image_label"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["small_image_label"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["thumbnail_label"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["url_key"]=> string(37) "ip-addressing-and-subnetting-inc-ipv6" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. They allow for the precise routing of data across very complex worldwide internetworks. The rules for their format and use are g" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "ip-addressing-and-subnetting-inc-ipv6.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Internetworking Protocol (IP) addresses are the unique numeric identifiers required...

    Rating:
    0%
    £38.99
    Add to Wish List
  63. Crafting Test-Driven Software with Python object(Magento\Catalog\Model\Product\Interceptor)#18680 (27) { ["entity_id"]=> string(5) "65789" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781838643911" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:32:15" ["updated_at"]=> string(19) "2025-07-24 14:32:15" ["price"]=> string(9) "28.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "28.990000" ["minimal_price"]=> string(9) "28.990000" ["min_price"]=> string(9) "28.990000" ["max_price"]=> string(9) "28.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(62) ["name"]=> string(41) "Crafting Test-Driven Software with Python" ["image_label"]=> string(41) "Crafting Test-Driven Software with Python" ["url_key"]=> string(41) "crafting-test-driven-software-with-python" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Get to grips with essential concepts and step-by-step explanations to apply TDD practices to your Python projects while keeping your test suite under controlKey FeaturesBuild robust Python applications using TDD and BDD methodologiesTest Python web applic" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "crafting-test-driven-software-with-python.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Get to grips with essential concepts and step-by-step explanations to...

    Rating:
    0%
    £28.99
    Add to Wish List
  64. Windows 2000 Configuration Wizards object(Magento\Catalog\Model\Product\Interceptor)#18681 (33) { ["entity_id"]=> string(5) "66132" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080543819" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:39:57" ["updated_at"]=> string(19) "2025-07-24 14:39:57" ["price"]=> string(9) "24.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "24.990000" ["minimal_price"]=> string(9) "24.990000" ["min_price"]=> string(9) "24.990000" ["max_price"]=> string(9) "24.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(63) ["name"]=> string(34) "Windows 2000 Configuration Wizards" ["image"]=> string(22) "/9/7/9780080543819.jpg" ["small_image"]=> string(22) "/9/7/9780080543819.jpg" ["thumbnail"]=> string(22) "/9/7/9780080543819.jpg" ["image_label"]=> string(34) "Windows 2000 Configuration Wizards" ["small_image_label"]=> string(34) "Windows 2000 Configuration Wizards" ["thumbnail_label"]=> string(34) "Windows 2000 Configuration Wizards" ["url_key"]=> string(34) "windows-2000-configuration-wizards" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Developers are used to working with Wizards, component-like products that allow them to create certain elements - like dialog buttons - quickly and easily while they are coding applications. With the launch of Windows 2000, Microsoft has announced a new s" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "windows-2000-configuration-wizards.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Developers are used to working with Wizards, component-like products that...

    Rating:
    0%
    £24.99
    Add to Wish List
  65. Security and Loss Prevention object(Magento\Catalog\Model\Product\Interceptor)#18682 (33) { ["entity_id"]=> string(5) "66946" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554006" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:57:39" ["updated_at"]=> string(19) "2025-07-24 14:57:39" ["price"]=> string(9) "43.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "43.990000" ["minimal_price"]=> string(9) "43.990000" ["min_price"]=> string(9) "43.990000" ["max_price"]=> string(9) "43.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(64) ["name"]=> string(28) "Security and Loss Prevention" ["image"]=> string(22) "/9/7/9780080554006.jpg" ["small_image"]=> string(22) "/9/7/9780080554006.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554006.jpg" ["image_label"]=> string(28) "Security and Loss Prevention" ["small_image_label"]=> string(28) "Security and Loss Prevention" ["thumbnail_label"]=> string(28) "Security and Loss Prevention" ["url_key"]=> string(28) "security-and-loss-prevention" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Security and Loss Prevention, Fifth Edition, encompasses the breadth and depth of considerations involved in implementing general loss prevention concepts and security programs within an organization.It presents proven strategies to prevent and reduce inc" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "security-and-loss-prevention.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Security and Loss Prevention, Fifth Edition, encompasses the breadth and...

    Rating:
    0%
    £43.99
    Add to Wish List
  66. Asterisk Hacking object(Magento\Catalog\Model\Product\Interceptor)#18683 (33) { ["entity_id"]=> string(5) "66982" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554358" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:58:40" ["updated_at"]=> string(19) "2025-07-24 14:58:40" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(65) ["name"]=> string(16) "Asterisk Hacking" ["image"]=> string(22) "/9/7/9780080554358.jpg" ["small_image"]=> string(22) "/9/7/9780080554358.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554358.jpg" ["image_label"]=> string(16) "Asterisk Hacking" ["small_image_label"]=> string(16) "Asterisk Hacking" ["thumbnail_label"]=> string(16) "Asterisk Hacking" ["url_key"]=> string(16) "asterisk-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "asterisk-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Asterisk Hacking provides detials of techniques people may not be...

    Rating:
    0%
    £32.99
    Add to Wish List
  67. Cyber Crime Investigations object(Magento\Catalog\Model\Product\Interceptor)#18684 (33) { ["entity_id"]=> string(5) "66902" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553634" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:56:44" ["updated_at"]=> string(19) "2025-07-24 14:56:44" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(66) ["name"]=> string(26) "Cyber Crime Investigations" ["image"]=> string(22) "/9/7/9780080553634.jpg" ["small_image"]=> string(22) "/9/7/9780080553634.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553634.jpg" ["image_label"]=> string(26) "Cyber Crime Investigations" ["small_image_label"]=> string(26) "Cyber Crime Investigations" ["thumbnail_label"]=> string(26) "Cyber Crime Investigations" ["url_key"]=> string(26) "cyber-crime-investigations" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter "e;What is Cyber Crime? This introductory chapter describes the most common cha" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(31) "cyber-crime-investigations.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by a former NYPD cyber cop, this is the...

    Rating:
    0%
    £36.99
    Add to Wish List
  68. Zen and the Art of Information Security object(Magento\Catalog\Model\Product\Interceptor)#18685 (33) { ["entity_id"]=> string(5) "67046" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554747" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:00:05" ["updated_at"]=> string(19) "2025-07-24 15:00:05" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(67) ["name"]=> string(39) "Zen and the Art of Information Security" ["image"]=> string(22) "/9/7/9780080554747.jpg" ["small_image"]=> string(22) "/9/7/9780080554747.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554747.jpg" ["image_label"]=> string(39) "Zen and the Art of Information Security" ["small_image_label"]=> string(39) "Zen and the Art of Information Security" ["thumbnail_label"]=> string(39) "Zen and the Art of Information Security" ["url_key"]=> string(39) "zen-and-the-art-of-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "zen-and-the-art-of-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    While security is generally perceived to be a complicated and...

    Rating:
    0%
    £19.99
    Add to Wish List
  69. Security+ Study Guide object(Magento\Catalog\Model\Product\Interceptor)#18686 (33) { ["entity_id"]=> string(5) "67246" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555430" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:03:43" ["updated_at"]=> string(19) "2025-07-24 15:03:43" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(68) ["name"]=> string(21) "Security+ Study Guide" ["image"]=> string(22) "/9/7/9780080555430.jpg" ["small_image"]=> string(22) "/9/7/9780080555430.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555430.jpg" ["image_label"]=> string(21) "Security+ Study Guide" ["small_image_label"]=> string(21) "Security+ Study Guide" ["thumbnail_label"]=> string(21) "Security+ Study Guide" ["url_key"]=> string(20) "security-study-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study GuidesThe Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverag" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(25) "security-study-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Over 700,000 IT Professionals Have Prepared for Exams with Syngress...

    Rating:
    0%
    £37.99
    Add to Wish List
  70. Practical Oracle Security object(Magento\Catalog\Model\Product\Interceptor)#18687 (33) { ["entity_id"]=> string(5) "67269" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555669" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:15" ["updated_at"]=> string(19) "2025-07-24 15:04:15" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(69) ["name"]=> string(25) "Practical Oracle Security" ["image"]=> string(22) "/9/7/9780080555669.jpg" ["small_image"]=> string(22) "/9/7/9780080555669.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555669.jpg" ["image_label"]=> string(25) "Practical Oracle Security" ["small_image_label"]=> string(25) "Practical Oracle Security" ["thumbnail_label"]=> string(25) "Practical Oracle Security" ["url_key"]=> string(25) "practical-oracle-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical," ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "practical-oracle-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only practical, hands-on guide available to database...

    Rating:
    0%
    £31.99
    Add to Wish List
  71. Perl Scripting for Windows Security object(Magento\Catalog\Model\Product\Interceptor)#18688 (33) { ["entity_id"]=> string(5) "67266" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555638" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:09" ["updated_at"]=> string(19) "2025-07-24 15:04:09" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(70) ["name"]=> string(35) "Perl Scripting for Windows Security" ["image"]=> string(22) "/9/7/9780080555638.jpg" ["small_image"]=> string(22) "/9/7/9780080555638.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555638.jpg" ["image_label"]=> string(35) "Perl Scripting for Windows Security" ["small_image_label"]=> string(35) "Perl Scripting for Windows Security" ["thumbnail_label"]=> string(35) "Perl Scripting for Windows Security" ["url_key"]=> string(35) "perl-scripting-for-windows-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay...I'll come clean...I used " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "perl-scripting-for-windows-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    I decided to write this book for a couple of...

    Rating:
    0%
    £31.99
    Add to Wish List
  72. Best Damn Cybercrime and Digital Forensics Book Period object(Magento\Catalog\Model\Product\Interceptor)#18689 (33) { ["entity_id"]=> string(5) "67327" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556086" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:05:44" ["updated_at"]=> string(19) "2025-07-24 15:05:44" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(71) ["name"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["image"]=> string(22) "/9/7/9780080556086.jpg" ["small_image"]=> string(22) "/9/7/9780080556086.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556086.jpg" ["image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["small_image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["thumbnail_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["url_key"]=> string(54) "best-damn-cybercrime-and-digital-forensics-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "best-damn-cybercrime-and-digital-forensics-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Electronic discovery refers to a process in which electronic data...

    Rating:
    0%
    £36.99
    Add to Wish List
Filter
Set Descending Direction

Items 1-72 of 620

Page
per page