Books

Filter
Set Descending Direction

Items 73-144 of 620

per page
  1. IT Regulatory and Standards Compliance Handbook object(Magento\Catalog\Model\Product\Interceptor)#13813 (33) { ["entity_id"]=> string(5) "67914" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080560175" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:19:53" ["updated_at"]=> string(19) "2025-07-24 15:19:53" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(47) "IT Regulatory and Standards Compliance Handbook" ["image"]=> string(22) "/9/7/9780080560175.jpg" ["small_image"]=> string(22) "/9/7/9780080560175.jpg" ["thumbnail"]=> string(22) "/9/7/9780080560175.jpg" ["image_label"]=> string(47) "IT Regulatory and Standards Compliance Handbook" ["small_image_label"]=> string(47) "IT Regulatory and Standards Compliance Handbook" ["thumbnail_label"]=> string(47) "IT Regulatory and Standards Compliance Handbook" ["url_key"]=> string(47) "it-regulatory-and-standards-compliance-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both bus" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(52) "it-regulatory-and-standards-compliance-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology,...

    Rating:
    0%
    £44.99
    Add to Wish List
  2. Zen and the Art of Information Security object(Magento\Catalog\Model\Product\Interceptor)#13792 (33) { ["entity_id"]=> string(5) "67046" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554747" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:00:05" ["updated_at"]=> string(19) "2025-07-24 15:00:05" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(39) "Zen and the Art of Information Security" ["image"]=> string(22) "/9/7/9780080554747.jpg" ["small_image"]=> string(22) "/9/7/9780080554747.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554747.jpg" ["image_label"]=> string(39) "Zen and the Art of Information Security" ["small_image_label"]=> string(39) "Zen and the Art of Information Security" ["thumbnail_label"]=> string(39) "Zen and the Art of Information Security" ["url_key"]=> string(39) "zen-and-the-art-of-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "zen-and-the-art-of-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    While security is generally perceived to be a complicated and...

    Rating:
    0%
    £19.99
    Add to Wish List
  3. Security+ Study Guide object(Magento\Catalog\Model\Product\Interceptor)#14323 (33) { ["entity_id"]=> string(5) "67246" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555430" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:03:43" ["updated_at"]=> string(19) "2025-07-24 15:03:43" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(21) "Security+ Study Guide" ["image"]=> string(22) "/9/7/9780080555430.jpg" ["small_image"]=> string(22) "/9/7/9780080555430.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555430.jpg" ["image_label"]=> string(21) "Security+ Study Guide" ["small_image_label"]=> string(21) "Security+ Study Guide" ["thumbnail_label"]=> string(21) "Security+ Study Guide" ["url_key"]=> string(20) "security-study-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study GuidesThe Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverag" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(25) "security-study-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Over 700,000 IT Professionals Have Prepared for Exams with Syngress...

    Rating:
    0%
    £37.99
    Add to Wish List
  4. Practical Oracle Security object(Magento\Catalog\Model\Product\Interceptor)#13841 (33) { ["entity_id"]=> string(5) "67269" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555669" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:15" ["updated_at"]=> string(19) "2025-07-24 15:04:15" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(25) "Practical Oracle Security" ["image"]=> string(22) "/9/7/9780080555669.jpg" ["small_image"]=> string(22) "/9/7/9780080555669.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555669.jpg" ["image_label"]=> string(25) "Practical Oracle Security" ["small_image_label"]=> string(25) "Practical Oracle Security" ["thumbnail_label"]=> string(25) "Practical Oracle Security" ["url_key"]=> string(25) "practical-oracle-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical," ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "practical-oracle-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only practical, hands-on guide available to database...

    Rating:
    0%
    £31.99
    Add to Wish List
  5. Perl Scripting for Windows Security object(Magento\Catalog\Model\Product\Interceptor)#13831 (33) { ["entity_id"]=> string(5) "67266" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555638" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:09" ["updated_at"]=> string(19) "2025-07-24 15:04:09" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(35) "Perl Scripting for Windows Security" ["image"]=> string(22) "/9/7/9780080555638.jpg" ["small_image"]=> string(22) "/9/7/9780080555638.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555638.jpg" ["image_label"]=> string(35) "Perl Scripting for Windows Security" ["small_image_label"]=> string(35) "Perl Scripting for Windows Security" ["thumbnail_label"]=> string(35) "Perl Scripting for Windows Security" ["url_key"]=> string(35) "perl-scripting-for-windows-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay...I'll come clean...I used " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "perl-scripting-for-windows-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    I decided to write this book for a couple of...

    Rating:
    0%
    £31.99
    Add to Wish List
  6. Best Damn Cybercrime and Digital Forensics Book Period object(Magento\Catalog\Model\Product\Interceptor)#13805 (33) { ["entity_id"]=> string(5) "67327" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556086" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:05:44" ["updated_at"]=> string(19) "2025-07-24 15:05:44" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["image"]=> string(22) "/9/7/9780080556086.jpg" ["small_image"]=> string(22) "/9/7/9780080556086.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556086.jpg" ["image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["small_image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["thumbnail_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["url_key"]=> string(54) "best-damn-cybercrime-and-digital-forensics-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "best-damn-cybercrime-and-digital-forensics-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Electronic discovery refers to a process in which electronic data...

    Rating:
    0%
    £36.99
    Add to Wish List
  7. Best Damn IT Security Management Book Period object(Magento\Catalog\Model\Product\Interceptor)#13810 (33) { ["entity_id"]=> string(5) "67407" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080557335" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:07:34" ["updated_at"]=> string(19) "2025-07-24 15:07:34" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(44) "Best Damn IT Security Management Book Period" ["image"]=> string(22) "/9/7/9780080557335.jpg" ["small_image"]=> string(22) "/9/7/9780080557335.jpg" ["thumbnail"]=> string(22) "/9/7/9780080557335.jpg" ["image_label"]=> string(44) "Best Damn IT Security Management Book Period" ["small_image_label"]=> string(44) "Best Damn IT Security Management Book Period" ["thumbnail_label"]=> string(44) "Best Damn IT Security Management Book Period" ["url_key"]=> string(44) "best-damn-it-security-management-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issue" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "best-damn-it-security-management-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The security field evolves rapidly becoming broader and more complex...

    Rating:
    0%
    £38.99
    Add to Wish List
  8. How to Cheat at Deploying and Securing RFID object(Magento\Catalog\Model\Product\Interceptor)#13830 (33) { ["entity_id"]=> string(5) "67471" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556895" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:08:57" ["updated_at"]=> string(19) "2025-07-24 15:08:57" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(43) "How to Cheat at Deploying and Securing RFID" ["image"]=> string(22) "/9/7/9780080556895.jpg" ["small_image"]=> string(22) "/9/7/9780080556895.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556895.jpg" ["image_label"]=> string(43) "How to Cheat at Deploying and Securing RFID" ["small_image_label"]=> string(43) "How to Cheat at Deploying and Securing RFID" ["thumbnail_label"]=> string(43) "How to Cheat at Deploying and Securing RFID" ["url_key"]=> string(43) "how-to-cheat-at-deploying-and-securing-rfid" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "how-to-cheat-at-deploying-and-securing-rfid.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    RFID is a method of remotely storing and receiving data...

    Rating:
    0%
    £31.99
    Add to Wish List
  9. People-Centric Security: Transforming Your Enterprise Security Culture object(Magento\Catalog\Model\Product\Interceptor)#13829 (33) { ["entity_id"]=> string(5) "49248" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071846790" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:31:56" ["updated_at"]=> string(19) "2025-07-24 06:41:28" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(70) "People-Centric Security: Transforming Your Enterprise Security Culture" ["image"]=> string(24) "/9/7/9780071846790_1.jpg" ["small_image"]=> string(24) "/9/7/9780071846790_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780071846790_1.jpg" ["image_label"]=> string(70) "People-Centric Security: Transforming Your Enterprise Security Culture" ["small_image_label"]=> string(70) "People-Centric Security: Transforming Your Enterprise Security Culture" ["thumbnail_label"]=> string(70) "People-Centric Security: Transforming Your Enterprise Security Culture" ["url_key"]=> string(69) "people-centric-security-transforming-your-enterprise-security-culture" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security-humansPeople-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change a" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(74) "people-centric-security-transforming-your-enterprise-security-culture.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A culture hacking how to complete with strategies, techniques, and...

    Rating:
    0%
    £54.90
    Add to Wish List
  10. Privacy Symposium 2022 object(Magento\Catalog\Model\Product\Interceptor)#13828 (27) { ["entity_id"]=> string(5) "51119" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031099014" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 19:08:14" ["updated_at"]=> string(19) "2025-07-24 07:17:18" ["price"]=> string(10) "179.500000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "179.500000" ["minimal_price"]=> string(10) "179.500000" ["min_price"]=> string(10) "179.500000" ["max_price"]=> string(10) "179.500000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(22) "Privacy Symposium 2022" ["image_label"]=> string(22) "Privacy Symposium 2022" ["url_key"]=> string(22) "privacy-symposium-2022" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(27) "privacy-symposium-2022.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book presents a collection of high-quality research works and...

    Rating:
    0%
    £179.50
    Add to Wish List
  11. Implementing Database Security and Auditing object(Magento\Catalog\Model\Product\Interceptor)#13827 (33) { ["entity_id"]=> string(5) "53599" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080470641" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:15:18" ["updated_at"]=> string(19) "2025-07-24 08:15:18" ["price"]=> string(9) "48.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "48.990000" ["minimal_price"]=> string(9) "48.990000" ["min_price"]=> string(9) "48.990000" ["max_price"]=> string(9) "48.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(43) "Implementing Database Security and Auditing" ["image"]=> string(22) "/9/7/9780080470641.jpg" ["small_image"]=> string(22) "/9/7/9780080470641.jpg" ["thumbnail"]=> string(22) "/9/7/9780080470641.jpg" ["image_label"]=> string(43) "Implementing Database Security and Auditing" ["small_image_label"]=> string(43) "Implementing Database Security and Auditing" ["thumbnail_label"]=> string(43) "Implementing Database Security and Auditing" ["url_key"]=> string(43) "implementing-database-security-and-auditing" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and audit" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "implementing-database-security-and-auditing.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is about database security and auditing. You will...

    Rating:
    0%
    £48.99
    Add to Wish List
  12. CCTV Surveillance object(Magento\Catalog\Model\Product\Interceptor)#13826 (33) { ["entity_id"]=> string(5) "52917" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080468181" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:04:09" ["updated_at"]=> string(19) "2025-07-24 08:04:09" ["price"]=> string(9) "59.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "59.990000" ["minimal_price"]=> string(9) "59.990000" ["min_price"]=> string(9) "59.990000" ["max_price"]=> string(9) "59.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(17) "CCTV Surveillance" ["image"]=> string(22) "/9/7/9780080468181.jpg" ["small_image"]=> string(22) "/9/7/9780080468181.jpg" ["thumbnail"]=> string(22) "/9/7/9780080468181.jpg" ["image_label"]=> string(17) "CCTV Surveillance" ["small_image_label"]=> string(17) "CCTV Surveillance" ["thumbnail_label"]=> string(17) "CCTV Surveillance" ["url_key"]=> string(17) "cctv-surveillance" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This revision of the classic book on CCTV technology, CCTV Surveillance, provides a comprehensive examination of CCTV, covering the applications of various systems, how to design and install a system, and how to choose the right hardware. Taking into a" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "cctv-surveillance.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This revision of the classic book on CCTV technology, ...

    Rating:
    0%
    £59.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. Building a Cisco Wireless Lan object(Magento\Catalog\Model\Product\Interceptor)#13825 (33) { ["entity_id"]=> string(5) "55160" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476247" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:45" ["updated_at"]=> string(19) "2025-07-24 08:41:45" ["price"]=> string(9) "43.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "43.990000" ["minimal_price"]=> string(9) "43.990000" ["min_price"]=> string(9) "43.990000" ["max_price"]=> string(9) "43.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(29) "Building a Cisco Wireless Lan" ["image"]=> string(22) "/9/7/9780080476247.jpg" ["small_image"]=> string(22) "/9/7/9780080476247.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476247.jpg" ["image_label"]=> string(29) "Building a Cisco Wireless Lan" ["small_image_label"]=> string(29) "Building a Cisco Wireless Lan" ["thumbnail_label"]=> string(29) "Building a Cisco Wireless Lan" ["url_key"]=> string(29) "building-a-cisco-wireless-lan" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Enable enterprise-wide information access using Cisco wireless networksWireless networks are rapidly becoming a viable alternative to traditional wired LANs (Local Area Networks), mainly because of the convenience they provide. By implementing a wireless " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "building-a-cisco-wireless-lan.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Enable enterprise-wide information access using Cisco wireless networksWireless networks are...

    Rating:
    0%
    £43.99
    Add to Wish List
  15. Building Robots With Lego Mindstorms object(Magento\Catalog\Model\Product\Interceptor)#13824 (33) { ["entity_id"]=> string(5) "55166" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476285" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:52" ["updated_at"]=> string(19) "2025-07-24 08:41:52" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(36) "Building Robots With Lego Mindstorms" ["image"]=> string(22) "/9/7/9780080476285.jpg" ["small_image"]=> string(22) "/9/7/9780080476285.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476285.jpg" ["image_label"]=> string(36) "Building Robots With Lego Mindstorms" ["small_image_label"]=> string(36) "Building Robots With Lego Mindstorms" ["thumbnail_label"]=> string(36) "Building Robots With Lego Mindstorms" ["url_key"]=> string(36) "building-robots-with-lego-mindstorms" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Lego robots! Mindstorms are sweeping the world and fans need to learn how to programme them Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Sin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(41) "building-robots-with-lego-mindstorms.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Lego robots! Mindstorms are sweeping the world and fans need...

    Rating:
    0%
    £30.99
    Add to Wish List
  16. Check Point Next Generation with Application Intelligence Security Administration object(Magento\Catalog\Model\Product\Interceptor)#13823 (33) { ["entity_id"]=> string(5) "55219" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476445" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:39" ["updated_at"]=> string(19) "2025-07-24 08:42:39" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["image"]=> string(22) "/9/7/9780080476445.jpg" ["small_image"]=> string(22) "/9/7/9780080476445.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476445.jpg" ["image_label"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["small_image_label"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["thumbnail_label"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["url_key"]=> string(81) "check-point-next-generation-with-application-intelligence-security-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Check Point Next Generation with Application Intelligence Security Administration focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(86) "check-point-next-generation-with-application-intelligence-security-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Check Point Next Generation with Application Intelligence Security Administration focuses...

    Rating:
    0%
    £38.99
    Add to Wish List
  17. Cisco AVVID and IP Telephony Design and Implementation object(Magento\Catalog\Model\Product\Interceptor)#13822 (33) { ["entity_id"]=> string(5) "55231" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476537" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:52" ["updated_at"]=> string(19) "2025-07-24 08:42:52" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["image"]=> string(22) "/9/7/9780080476537.jpg" ["small_image"]=> string(22) "/9/7/9780080476537.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476537.jpg" ["image_label"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["small_image_label"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["thumbnail_label"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["url_key"]=> string(54) "cisco-avvid-and-ip-telephony-design-and-implementation" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Corporate demand for AVVID solutions is rapidly increasing - engineers will need this bookCisco AVVID (Architecture for Voice, Video and Integrated Data), the latest development from Cisco Systems, is redefining the way businesses communicate. AVVID allow" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "cisco-avvid-and-ip-telephony-design-and-implementation.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Corporate demand for AVVID solutions is rapidly increasing - engineers...

    Rating:
    0%
    £44.99
    Add to Wish List
  18. Best Damn Cisco Internetworking Book Period object(Magento\Catalog\Model\Product\Interceptor)#13821 (33) { ["entity_id"]=> string(5) "55079" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476056" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:40:16" ["updated_at"]=> string(19) "2025-07-24 08:40:16" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["image"]=> string(22) "/9/7/9780080476056.jpg" ["small_image"]=> string(22) "/9/7/9780080476056.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476056.jpg" ["image_label"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["small_image_label"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["thumbnail_label"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["url_key"]=> string(43) "best-damn-cisco-internetworking-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Best Damn Cisco Internetworking Book Period shows readers everything they need to know about all Cisco internetworking topics. The book provides an understanding of Cisco's current VoIP solutions and the means to put them to work, showing how to confi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "best-damn-cisco-internetworking-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Best Damn Cisco Internetworking Book Period shows readers everything...

    Rating:
    0%
    £39.99
    Add to Wish List
  19. Bluetooth Application Developer's Guide object(Magento\Catalog\Model\Product\Interceptor)#13820 (33) { ["entity_id"]=> string(5) "55131" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476179" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:16" ["updated_at"]=> string(19) "2025-07-24 08:41:16" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(39) "Bluetooth Application Developer's Guide" ["image"]=> string(22) "/9/7/9780080476179.jpg" ["small_image"]=> string(22) "/9/7/9780080476179.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476179.jpg" ["image_label"]=> string(39) "Bluetooth Application Developer's Guide" ["small_image_label"]=> string(39) "Bluetooth Application Developer's Guide" ["thumbnail_label"]=> string(39) "Bluetooth Application Developer's Guide" ["url_key"]=> string(39) "bluetooth-application-developer-s-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;Bluetooth (enabled devices) will ship in the billions of units once it gains momentum."e; - Martin Reynolds, Gartner GroupBluetooth is the most exciting development in wireless computing this decade! Bluetooth enabled devices can include everyt" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "bluetooth-application-developer-s-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;Bluetooth (enabled devices) will ship in the billions of units...

    Rating:
    0%
    £31.99
    Add to Wish List
  20. Configuring Symantec AntiVirus Enterprise Edition object(Magento\Catalog\Model\Product\Interceptor)#13819 (33) { ["entity_id"]=> string(5) "55272" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476711" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:43:42" ["updated_at"]=> string(19) "2025-07-24 08:43:42" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(49) "Configuring Symantec AntiVirus Enterprise Edition" ["image"]=> string(22) "/9/7/9780080476711.jpg" ["small_image"]=> string(22) "/9/7/9780080476711.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476711.jpg" ["image_label"]=> string(49) "Configuring Symantec AntiVirus Enterprise Edition" ["small_image_label"]=> string(49) "Configuring Symantec AntiVirus Enterprise Edition" ["thumbnail_label"]=> string(49) "Configuring Symantec AntiVirus Enterprise Edition" ["url_key"]=> string(49) "configuring-symantec-antivirus-enterprise-edition" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of "e;Centralized Antivirus Management."e; For" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(54) "configuring-symantec-antivirus-enterprise-edition.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only book that will teach system administrators...

    Rating:
    0%
    £38.99
    Add to Wish List
  21. Securing HP NonStop Servers in an Open Systems World object(Magento\Catalog\Model\Product\Interceptor)#13818 (33) { ["entity_id"]=> string(5) "54994" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080475578" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:38:37" ["updated_at"]=> string(19) "2025-07-24 08:38:37" ["price"]=> string(9) "80.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "80.000000" ["minimal_price"]=> string(9) "80.000000" ["min_price"]=> string(9) "80.000000" ["max_price"]=> string(9) "80.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(19) ["name"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["image"]=> string(22) "/9/7/9780080475578.jpg" ["small_image"]=> string(22) "/9/7/9780080475578.jpg" ["thumbnail"]=> string(22) "/9/7/9780080475578.jpg" ["image_label"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["small_image_label"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["thumbnail_label"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["url_key"]=> string(52) "securing-hp-nonstop-servers-in-an-open-systems-world" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(57) "securing-hp-nonstop-servers-in-an-open-systems-world.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Recent corporate events have exposed the frequency and consequences of...

    Rating:
    0%
    £80.00
    Add to Wish List
  22. Cisco Security Specialists Guide to PIX Firewall object(Magento\Catalog\Model\Product\Interceptor)#13817 (33) { ["entity_id"]=> string(5) "55235" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476551" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:58" ["updated_at"]=> string(19) "2025-07-24 08:42:58" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(20) ["name"]=> string(48) "Cisco Security Specialists Guide to PIX Firewall" ["image"]=> string(22) "/9/7/9780080476551.jpg" ["small_image"]=> string(22) "/9/7/9780080476551.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476551.jpg" ["image_label"]=> string(48) "Cisco Security Specialists Guide to PIX Firewall" ["small_image_label"]=> string(48) "Cisco Security Specialists Guide to PIX Firewall" ["thumbnail_label"]=> string(48) "Cisco Security Specialists Guide to PIX Firewall" ["url_key"]=> string(48) "cisco-security-specialists-guide-to-pix-firewall" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "cisco-security-specialists-guide-to-pix-firewall.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cisco Security Specialist's Guide to PIX Firewall immerses the reader...

    Rating:
    0%
    £38.99
    Add to Wish List
  23. Developing .Net Web Services With XML object(Magento\Catalog\Model\Product\Interceptor)#13806 (33) { ["entity_id"]=> string(5) "55379" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477213" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:48" ["updated_at"]=> string(19) "2025-07-24 08:55:48" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(21) ["name"]=> string(37) "Developing .Net Web Services With XML" ["image"]=> string(22) "/9/7/9780080477213.jpg" ["small_image"]=> string(22) "/9/7/9780080477213.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477213.jpg" ["image_label"]=> string(37) "Developing .Net Web Services With XML" ["small_image_label"]=> string(37) "Developing .Net Web Services With XML" ["thumbnail_label"]=> string(37) "Developing .Net Web Services With XML" ["url_key"]=> string(36) "developing-net-web-services-with-xml" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. Developing .Net Web Services with XML introduces " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(41) "developing-net-web-services-with-xml.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Prepare for the next generation of the internet with this...

    Rating:
    0%
    £31.99
    Add to Wish List
  24. Hack Proofing Your Identity In The Information Age object(Magento\Catalog\Model\Product\Interceptor)#13809 (33) { ["entity_id"]=> string(5) "55513" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478081" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:20" ["updated_at"]=> string(19) "2025-07-24 08:58:20" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(22) ["name"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["image"]=> string(22) "/9/7/9780080478081.jpg" ["small_image"]=> string(22) "/9/7/9780080478081.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478081.jpg" ["image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["small_image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["thumbnail_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["url_key"]=> string(50) "hack-proofing-your-identity-in-the-information-age" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "hack-proofing-your-identity-in-the-information-age.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Identity-theft is the fastest growing crime in America, affecting approximately...

    Rating:
    0%
    £25.99
    Add to Wish List
  25. Hack Proofing ColdFusion object(Magento\Catalog\Model\Product\Interceptor)#13815 (33) { ["entity_id"]=> string(5) "55521" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478098" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:30" ["updated_at"]=> string(19) "2025-07-24 08:58:30" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(23) ["name"]=> string(24) "Hack Proofing ColdFusion" ["image"]=> string(22) "/9/7/9780080478098.jpg" ["small_image"]=> string(22) "/9/7/9780080478098.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478098.jpg" ["image_label"]=> string(24) "Hack Proofing ColdFusion" ["small_image_label"]=> string(24) "Hack Proofing ColdFusion" ["thumbnail_label"]=> string(24) "Hack Proofing ColdFusion" ["url_key"]=> string(24) "hack-proofing-coldfusion" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user b" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(29) "hack-proofing-coldfusion.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £30.99
    Add to Wish List
  26. Hackproofing Your Wireless Network object(Magento\Catalog\Model\Product\Interceptor)#13812 (33) { ["entity_id"]=> string(5) "55550" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478180" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:59:09" ["updated_at"]=> string(19) "2025-07-24 08:59:09" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(24) ["name"]=> string(34) "Hackproofing Your Wireless Network" ["image"]=> string(22) "/9/7/9780080478180.jpg" ["small_image"]=> string(22) "/9/7/9780080478180.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478180.jpg" ["image_label"]=> string(34) "Hackproofing Your Wireless Network" ["small_image_label"]=> string(34) "Hackproofing Your Wireless Network" ["thumbnail_label"]=> string(34) "Hackproofing Your Wireless Network" ["url_key"]=> string(34) "hackproofing-your-wireless-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "hackproofing-your-wireless-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £31.99
    Add to Wish List
  27. Configuring NetScreen Firewalls object(Magento\Catalog\Model\Product\Interceptor)#13807 (33) { ["entity_id"]=> string(5) "55294" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476780" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:44:09" ["updated_at"]=> string(19) "2025-07-24 08:54:11" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(25) ["name"]=> string(31) "Configuring NetScreen Firewalls" ["image"]=> string(24) "/9/7/9780080476780_1.jpg" ["small_image"]=> string(24) "/9/7/9780080476780_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080476780_1.jpg" ["image_label"]=> string(31) "Configuring NetScreen Firewalls" ["small_image_label"]=> string(31) "Configuring NetScreen Firewalls" ["thumbnail_label"]=> string(31) "Configuring NetScreen Firewalls" ["url_key"]=> string(31) "configuring-netscreen-firewalls" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for secu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "configuring-netscreen-firewalls.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The first book on the market covering the #2 best-selling...

    Rating:
    0%
    £31.99
    Add to Wish List
  28. Dr. Tom Shinder's Configuring ISA Server 2004 object(Magento\Catalog\Model\Product\Interceptor)#13816 (33) { ["entity_id"]=> string(5) "55305" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477404" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:44:22" ["updated_at"]=> string(19) "2025-07-24 08:54:30" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(26) ["name"]=> string(45) "Dr. Tom Shinder's Configuring ISA Server 2004" ["image"]=> string(24) "/9/7/9780080477404_1.jpg" ["small_image"]=> string(24) "/9/7/9780080477404_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080477404_1.jpg" ["image_label"]=> string(45) "Dr. Tom Shinder's Configuring ISA Server 2004" ["small_image_label"]=> string(45) "Dr. Tom Shinder's Configuring ISA Server 2004" ["thumbnail_label"]=> string(45) "Dr. Tom Shinder's Configuring ISA Server 2004" ["url_key"]=> string(44) "dr-tom-shinder-s-configuring-isa-server-2004" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web s" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "dr-tom-shinder-s-configuring-isa-server-2004.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Dr. Tom and Debra Shinder have become synonymous with Microsoft's...

    Rating:
    0%
    £31.99
    Add to Wish List
  29. CYA Securing Exchange Server 2003 object(Magento\Catalog\Model\Product\Interceptor)#13793 (33) { ["entity_id"]=> string(5) "55339" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476971" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:54:58" ["updated_at"]=> string(19) "2025-07-24 08:54:58" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(27) ["name"]=> string(33) "CYA Securing Exchange Server 2003" ["image"]=> string(22) "/9/7/9780080476971.jpg" ["small_image"]=> string(22) "/9/7/9780080476971.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476971.jpg" ["image_label"]=> string(33) "CYA Securing Exchange Server 2003" ["small_image_label"]=> string(33) "CYA Securing Exchange Server 2003" ["thumbnail_label"]=> string(33) "CYA Securing Exchange Server 2003" ["url_key"]=> string(33) "cya-securing-exchange-server-2003" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "e;MMCs"e; (Microsoft Management Consoles) that contain the configuration me" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "cya-securing-exchange-server-2003.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A highly portable, easily digestible road-map to configuring, maintaining and...

    Rating:
    0%
    £25.99
    Add to Wish List
  30. CYA Securing IIS 6.0 object(Magento\Catalog\Model\Product\Interceptor)#13814 (33) { ["entity_id"]=> string(5) "55340" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476988" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:00" ["updated_at"]=> string(19) "2025-07-24 08:55:00" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(28) ["name"]=> string(20) "CYA Securing IIS 6.0" ["image"]=> string(22) "/9/7/9780080476988.jpg" ["small_image"]=> string(22) "/9/7/9780080476988.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476988.jpg" ["image_label"]=> string(20) "CYA Securing IIS 6.0" ["small_image_label"]=> string(20) "CYA Securing IIS 6.0" ["thumbnail_label"]=> string(20) "CYA Securing IIS 6.0" ["url_key"]=> string(19) "cya-securing-iis-60" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "e;MMCs"e; (Microsoft Management Consoles) that contain the configuration menus for the es" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "cya-securing-iis-60.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A highly portable, easily digestible road-map to configuring, maintaining and...

    Rating:
    0%
    £25.99
    Add to Wish List
  31. Hacking the Code object(Magento\Catalog\Model\Product\Interceptor)#14318 (33) { ["entity_id"]=> string(5) "55545" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478173" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:59:01" ["updated_at"]=> string(19) "2025-07-24 08:59:01" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(29) ["name"]=> string(16) "Hacking the Code" ["image"]=> string(22) "/9/7/9780080478173.jpg" ["small_image"]=> string(22) "/9/7/9780080478173.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478173.jpg" ["image_label"]=> string(16) "Hacking the Code" ["small_image_label"]=> string(16) "Hacking the Code" ["thumbnail_label"]=> string(16) "Hacking the Code" ["url_key"]=> string(16) "hacking-the-code" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "hacking-the-code.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Hacking the Code has over 400 pages of dedicated exploit,...

    Rating:
    0%
    £32.99
    Add to Wish List
  32. Managing Cisco Network Security object(Magento\Catalog\Model\Product\Interceptor)#14319 (33) { ["entity_id"]=> string(5) "55759" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479057" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:03:20" ["updated_at"]=> string(19) "2025-07-24 09:03:20" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(30) ["name"]=> string(31) "Managing Cisco Network Security" ["image"]=> string(22) "/9/7/9780080479057.jpg" ["small_image"]=> string(22) "/9/7/9780080479057.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479057.jpg" ["image_label"]=> string(31) "Managing Cisco Network Security" ["small_image_label"]=> string(31) "Managing Cisco Network Security" ["thumbnail_label"]=> string(31) "Managing Cisco Network Security" ["url_key"]=> string(31) "managing-cisco-network-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world"e;There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."e; -Mike F" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "managing-cisco-network-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    An in-depth knowledge of how to configure Cisco IP network...

    Rating:
    0%
    £38.99
    Add to Wish List
  33. Nessus Network Auditing object(Magento\Catalog\Model\Product\Interceptor)#14321 (33) { ["entity_id"]=> string(5) "55898" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479620" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:06:04" ["updated_at"]=> string(19) "2025-07-24 09:06:04" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(31) ["name"]=> string(23) "Nessus Network Auditing" ["image"]=> string(22) "/9/7/9780080479620.jpg" ["small_image"]=> string(22) "/9/7/9780080479620.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479620.jpg" ["image_label"]=> string(23) "Nessus Network Auditing" ["small_image_label"]=> string(23) "Nessus Network Auditing" ["thumbnail_label"]=> string(23) "Nessus Network Auditing" ["url_key"]=> string(23) "nessus-network-auditing" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for report" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "nessus-network-auditing.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book focuses on installing, configuring and optimizing Nessus, which...

    Rating:
    0%
    £31.99
    Add to Wish List
  34. Cyber Adversary Characterization object(Magento\Catalog\Model\Product\Interceptor)#14325 (33) { ["entity_id"]=> string(5) "55341" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476995" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:01" ["updated_at"]=> string(19) "2025-07-24 08:55:01" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(32) ["name"]=> string(32) "Cyber Adversary Characterization" ["image"]=> string(22) "/9/7/9780080476995.jpg" ["small_image"]=> string(22) "/9/7/9780080476995.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476995.jpg" ["image_label"]=> string(32) "Cyber Adversary Characterization" ["small_image_label"]=> string(32) "Cyber Adversary Characterization" ["thumbnail_label"]=> string(32) "Cyber Adversary Characterization" ["url_key"]=> string(32) "cyber-adversary-characterization" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "cyber-adversary-characterization.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The wonders and advantages of modern age electronics and the...

    Rating:
    0%
    £31.99
    Add to Wish List
  35. Mezonic Agenda: Hacking the Presidency object(Magento\Catalog\Model\Product\Interceptor)#14324 (33) { ["entity_id"]=> string(5) "55821" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479408" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:04:28" ["updated_at"]=> string(19) "2025-07-24 09:04:28" ["price"]=> string(9) "21.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "21.990000" ["minimal_price"]=> string(9) "21.990000" ["min_price"]=> string(9) "21.990000" ["max_price"]=> string(9) "21.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(33) ["name"]=> string(38) "Mezonic Agenda: Hacking the Presidency" ["image"]=> string(22) "/9/7/9780080479408.jpg" ["small_image"]=> string(22) "/9/7/9780080479408.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479408.jpg" ["image_label"]=> string(38) "Mezonic Agenda: Hacking the Presidency" ["small_image_label"]=> string(38) "Mezonic Agenda: Hacking the Presidency" ["thumbnail_label"]=> string(38) "Mezonic Agenda: Hacking the Presidency" ["url_key"]=> string(37) "mezonic-agenda-hacking-the-presidency" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromis" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "mezonic-agenda-hacking-the-presidency.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Mezonic Agenda deals with some of the most pressing...

    Rating:
    0%
    £21.99
    Add to Wish List
  36. Nokia Network Security Solutions Handbook object(Magento\Catalog\Model\Product\Interceptor)#14326 (33) { ["entity_id"]=> string(5) "55919" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479712" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:06:30" ["updated_at"]=> string(19) "2025-07-24 09:06:30" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(34) ["name"]=> string(41) "Nokia Network Security Solutions Handbook" ["image"]=> string(22) "/9/7/9780080479712.jpg" ["small_image"]=> string(22) "/9/7/9780080479712.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479712.jpg" ["image_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["small_image_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["thumbnail_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["url_key"]=> string(41) "nokia-network-security-solutions-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "nokia-network-security-solutions-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Nokia Network Security Solutions Handbook introduces readers to both...

    Rating:
    0%
    £37.99
    Add to Wish List
  37. Sniffer Pro Network Optimization & Troubleshooting Handbook object(Magento\Catalog\Model\Product\Interceptor)#14327 (33) { ["entity_id"]=> string(5) "56181" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480985" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:29" ["updated_at"]=> string(19) "2025-07-24 09:11:29" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(35) ["name"]=> string(59) "Sniffer Pro Network Optimization & Troubleshooting Handbook" ["image"]=> string(22) "/9/7/9780080480985.jpg" ["small_image"]=> string(22) "/9/7/9780080480985.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480985.jpg" ["image_label"]=> string(59) "Sniffer Pro Network Optimization & Troubleshooting Handbook" ["small_image_label"]=> string(59) "Sniffer Pro Network Optimization & Troubleshooting Handbook" ["thumbnail_label"]=> string(59) "Sniffer Pro Network Optimization & Troubleshooting Handbook" ["url_key"]=> string(57) "sniffer-pro-network-optimization-troubleshooting-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(62) "sniffer-pro-network-optimization-troubleshooting-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to...

    Rating:
    0%
    £31.99
    Add to Wish List
  38. Snort 2.1 Intrusion Detection, Second Edition object(Magento\Catalog\Model\Product\Interceptor)#14328 (33) { ["entity_id"]=> string(5) "56193" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480992" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:46" ["updated_at"]=> string(19) "2025-07-24 09:11:46" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(36) ["name"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["image"]=> string(22) "/9/7/9780080480992.jpg" ["small_image"]=> string(22) "/9/7/9780080480992.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480992.jpg" ["image_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["small_image_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["thumbnail_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["url_key"]=> string(43) "snort-21-intrusion-detection-second-edition" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Called "e;the leader in the Snort IDS book arms race"e; by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "snort-21-intrusion-detection-second-edition.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Called "e;the leader in the Snort IDS book arms race"e;...

    Rating:
    0%
    £31.99
    Add to Wish List
  39. Stealing the Network object(Magento\Catalog\Model\Product\Interceptor)#14329 (33) { ["entity_id"]=> string(5) "56200" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481104" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:12:01" ["updated_at"]=> string(19) "2025-07-24 09:12:01" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(37) ["name"]=> string(20) "Stealing the Network" ["image"]=> string(22) "/9/7/9780080481104.jpg" ["small_image"]=> string(22) "/9/7/9780080481104.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481104.jpg" ["image_label"]=> string(20) "Stealing the Network" ["small_image_label"]=> string(20) "Stealing the Network" ["thumbnail_label"]=> string(20) "Stealing the Network" ["url_key"]=> string(20) "stealing-the-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(25) "stealing-the-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is a book that will create enormous debate within...

    Rating:
    0%
    £32.99
    Add to Wish List
  40. WarDriving: Drive, Detect, Defend object(Magento\Catalog\Model\Product\Interceptor)#14330 (33) { ["entity_id"]=> string(5) "56357" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481685" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:14:37" ["updated_at"]=> string(19) "2025-07-24 09:14:37" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(38) ["name"]=> string(33) "WarDriving: Drive, Detect, Defend" ["image"]=> string(22) "/9/7/9780080481685.jpg" ["small_image"]=> string(22) "/9/7/9780080481685.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481685.jpg" ["image_label"]=> string(33) "WarDriving: Drive, Detect, Defend" ["small_image_label"]=> string(33) "WarDriving: Drive, Detect, Defend" ["thumbnail_label"]=> string(33) "WarDriving: Drive, Detect, Defend" ["url_key"]=> string(30) "wardriving-drive-detect-defend" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has spa" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "wardriving-drive-detect-defend.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The practice of WarDriving is a unique combination of hobby,...

    Rating:
    0%
    £31.99
    Add to Wish List
  41. Windows 2000 Active Directory object(Magento\Catalog\Model\Product\Interceptor)#14331 (33) { ["entity_id"]=> string(5) "56434" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481746" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:15:42" ["updated_at"]=> string(19) "2025-07-24 09:15:42" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(39) ["name"]=> string(29) "Windows 2000 Active Directory" ["image"]=> string(22) "/9/7/9780080481746.jpg" ["small_image"]=> string(22) "/9/7/9780080481746.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481746.jpg" ["image_label"]=> string(29) "Windows 2000 Active Directory" ["small_image_label"]=> string(29) "Windows 2000 Active Directory" ["thumbnail_label"]=> string(29) "Windows 2000 Active Directory" ["url_key"]=> string(29) "windows-2000-active-directory" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Updated coverage of the most confusing Windows 2000 component in this new edition of a Syngress bestseller.Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primar" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "windows-2000-active-directory.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Updated coverage of the most confusing Windows 2000 component in...

    Rating:
    0%
    £31.99
    Add to Wish List
  42. Windows 2000 Server System Administration Handbook object(Magento\Catalog\Model\Product\Interceptor)#14332 (33) { ["entity_id"]=> string(5) "56436" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481753" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:15:44" ["updated_at"]=> string(19) "2025-07-24 09:15:44" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(40) ["name"]=> string(50) "Windows 2000 Server System Administration Handbook" ["image"]=> string(22) "/9/7/9780080481753.jpg" ["small_image"]=> string(22) "/9/7/9780080481753.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481753.jpg" ["image_label"]=> string(50) "Windows 2000 Server System Administration Handbook" ["small_image_label"]=> string(50) "Windows 2000 Server System Administration Handbook" ["thumbnail_label"]=> string(50) "Windows 2000 Server System Administration Handbook" ["url_key"]=> string(50) "windows-2000-server-system-administration-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring, and managing Microsoft products will be highly motivated to migrate to this new techn" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "windows-2000-server-system-administration-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Many organizations and network administrators are looking for information on...

    Rating:
    0%
    £31.99
    Add to Wish List
  43. How to Cheat at Managing Microsoft Operations Manager 2005 object(Magento\Catalog\Model\Product\Interceptor)#14333 (33) { ["entity_id"]=> string(5) "56651" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488462" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:20:00" ["updated_at"]=> string(19) "2025-07-24 09:20:00" ["price"]=> string(9) "24.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "24.990000" ["minimal_price"]=> string(9) "24.990000" ["min_price"]=> string(9) "24.990000" ["max_price"]=> string(9) "24.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(41) ["name"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["image"]=> string(22) "/9/7/9780080488462.jpg" ["small_image"]=> string(22) "/9/7/9780080488462.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488462.jpg" ["image_label"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["small_image_label"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["thumbnail_label"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["url_key"]=> string(58) "how-to-cheat-at-managing-microsoft-operations-manager-2005" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administra" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(63) "how-to-cheat-at-managing-microsoft-operations-manager-2005.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft Operations Manager (MOM) is a network monitoring tool that...

    Rating:
    0%
    £24.99
    Add to Wish List
  44. Cisco PIX Firewalls object(Magento\Catalog\Model\Product\Interceptor)#14334 (33) { ["entity_id"]=> string(5) "56653" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488486" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:20:03" ["updated_at"]=> string(19) "2025-07-24 09:20:03" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(42) ["name"]=> string(19) "Cisco PIX Firewalls" ["image"]=> string(22) "/9/7/9780080488486.jpg" ["small_image"]=> string(22) "/9/7/9780080488486.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488486.jpg" ["image_label"]=> string(19) "Cisco PIX Firewalls" ["small_image_label"]=> string(19) "Cisco PIX Firewalls" ["thumbnail_label"]=> string(19) "Cisco PIX Firewalls" ["url_key"]=> string(19) "cisco-pix-firewalls" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "cisco-pix-firewalls.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Umer Khan's first book, Cisco Security Specialist's Guide to PIX...

    Rating:
    0%
    £31.99
    Add to Wish List
  45. Palm OS Web Application Developers Guide object(Magento\Catalog\Model\Product\Interceptor)#14335 (33) { ["entity_id"]=> string(5) "55969" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479880" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:07:29" ["updated_at"]=> string(19) "2025-07-24 09:07:29" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(43) ["name"]=> string(40) "Palm OS Web Application Developers Guide" ["image"]=> string(22) "/9/7/9780080479880.jpg" ["small_image"]=> string(22) "/9/7/9780080479880.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479880.jpg" ["image_label"]=> string(40) "Palm OS Web Application Developers Guide" ["small_image_label"]=> string(40) "Palm OS Web Application Developers Guide" ["thumbnail_label"]=> string(40) "Palm OS Web Application Developers Guide" ["url_key"]=> string(40) "palm-os-web-application-developers-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "With an 80% hand-held device market-share, the Palm Organizer is the platform of choice for Mobile Internet application developers.With its decision to license the Palm OS to rival device manufacturers such as Sony, Motorola, and Handspring, Palm has furt" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "palm-os-web-application-developers-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    With an 80% hand-held device market-share, the Palm Organizer is...

    Rating:
    0%
    £31.99
    Add to Wish List
  46. Security + Study Guide and DVD Training System object(Magento\Catalog\Model\Product\Interceptor)#14336 (33) { ["entity_id"]=> string(5) "56170" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480817" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:16" ["updated_at"]=> string(19) "2025-07-24 09:11:16" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(44) ["name"]=> string(46) "Security + Study Guide and DVD Training System" ["image"]=> string(22) "/9/7/9780080480817.jpg" ["small_image"]=> string(22) "/9/7/9780080480817.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480817.jpg" ["image_label"]=> string(46) "Security + Study Guide and DVD Training System" ["small_image_label"]=> string(46) "Security + Study Guide and DVD Training System" ["thumbnail_label"]=> string(46) "Security + Study Guide and DVD Training System" ["url_key"]=> string(44) "security-study-guide-and-dvd-training-system" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential? Thanks to soaring e-business initiatives and worldwide Internet connectivity," ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "security-study-guide-and-dvd-training-system.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Why has CompTIA (the high-profile Computer Technology Industry Association behind...

    Rating:
    0%
    £37.99
    Add to Wish List
  47. Security Sage's Guide to Hardening the Network Infrastructure object(Magento\Catalog\Model\Product\Interceptor)#14337 (33) { ["entity_id"]=> string(5) "56172" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480831" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:18" ["updated_at"]=> string(19) "2025-07-24 09:11:18" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(45) ["name"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["image"]=> string(22) "/9/7/9780080480831.jpg" ["small_image"]=> string(22) "/9/7/9780080480831.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480831.jpg" ["image_label"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["small_image_label"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["thumbnail_label"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["url_key"]=> string(61) "security-sage-s-guide-to-hardening-the-network-infrastructure" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Netw" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(66) "security-sage-s-guide-to-hardening-the-network-infrastructure.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only computer book to focus completely on...

    Rating:
    0%
    £38.99
    Add to Wish List
  48. Troubleshooting Windows 2000 TCP/IP object(Magento\Catalog\Model\Product\Interceptor)#14338 (33) { ["entity_id"]=> string(5) "56225" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481456" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:12:34" ["updated_at"]=> string(19) "2025-07-24 09:12:34" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(46) ["name"]=> string(35) "Troubleshooting Windows 2000 TCP/IP" ["image"]=> string(22) "/9/7/9780080481456.jpg" ["small_image"]=> string(22) "/9/7/9780080481456.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481456.jpg" ["image_label"]=> string(35) "Troubleshooting Windows 2000 TCP/IP" ["small_image_label"]=> string(35) "Troubleshooting Windows 2000 TCP/IP" ["thumbnail_label"]=> string(35) "Troubleshooting Windows 2000 TCP/IP" ["url_key"]=> string(35) "troubleshooting-windows-2000-tcp-ip" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "e;supposed"e; to work is not enough " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "troubleshooting-windows-2000-tcp-ip.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    TCP/IP is a set of proposals developed to allow cooperating...

    Rating:
    0%
    £31.99
    Add to Wish List
  49. Configuring Check Point NGX VPN-1/Firewall-1 object(Magento\Catalog\Model\Product\Interceptor)#14339 (33) { ["entity_id"]=> string(5) "56667" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488561" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:20:28" ["updated_at"]=> string(19) "2025-07-24 09:20:28" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(47) ["name"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["image"]=> string(22) "/9/7/9780080488561.jpg" ["small_image"]=> string(22) "/9/7/9780080488561.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488561.jpg" ["image_label"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["small_image_label"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["thumbnail_label"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["url_key"]=> string(44) "configuring-check-point-ngx-vpn-1-firewall-1" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Lin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "configuring-check-point-ngx-vpn-1-firewall-1.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Check Point NGX VPN-1/Firewall-1 is the next major release of...

    Rating:
    0%
    £31.99
    Add to Wish List
  50. HP NonStop Server Security object(Magento\Catalog\Model\Product\Interceptor)#14340 (33) { ["entity_id"]=> string(5) "57899" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491493" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:42:32" ["updated_at"]=> string(19) "2025-07-24 09:42:32" ["price"]=> string(9) "83.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "83.000000" ["minimal_price"]=> string(9) "83.000000" ["min_price"]=> string(9) "83.000000" ["max_price"]=> string(9) "83.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(48) ["name"]=> string(26) "HP NonStop Server Security" ["image"]=> string(22) "/9/7/9780080491493.jpg" ["small_image"]=> string(22) "/9/7/9780080491493.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491493.jpg" ["image_label"]=> string(26) "HP NonStop Server Security" ["small_image_label"]=> string(26) "HP NonStop Server Security" ["thumbnail_label"]=> string(26) "HP NonStop Server Security" ["url_key"]=> string(26) "hp-nonstop-server-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(31) "hp-nonstop-server-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Since the last publication of the Ernst and Young book...

    Rating:
    0%
    £83.00
    Add to Wish List
  51. Information Security Best Practices object(Magento\Catalog\Model\Product\Interceptor)#14341 (33) { ["entity_id"]=> string(5) "57902" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491547" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:42:36" ["updated_at"]=> string(19) "2025-07-24 09:42:36" ["price"]=> string(9) "33.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "33.990000" ["minimal_price"]=> string(9) "33.990000" ["min_price"]=> string(9) "33.990000" ["max_price"]=> string(9) "33.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(49) ["name"]=> string(35) "Information Security Best Practices" ["image"]=> string(22) "/9/7/9780080491547.jpg" ["small_image"]=> string(22) "/9/7/9780080491547.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491547.jpg" ["image_label"]=> string(35) "Information Security Best Practices" ["small_image_label"]=> string(35) "Information Security Best Practices" ["thumbnail_label"]=> string(35) "Information Security Best Practices" ["url_key"]=> string(35) "information-security-best-practices" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "information-security-best-practices.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Protecting computer networks and their client computers against willful (or...

    Rating:
    0%
    £33.99
    Add to Wish List
  52. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services object(Magento\Catalog\Model\Product\Interceptor)#14342 (33) { ["entity_id"]=> string(5) "56701" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488691" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:09" ["updated_at"]=> string(19) "2025-07-24 09:21:09" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(50) ["name"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["image"]=> string(22) "/9/7/9780080488691.jpg" ["small_image"]=> string(22) "/9/7/9780080488691.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488691.jpg" ["image_label"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["small_image_label"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["thumbnail_label"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["url_key"]=> string(92) "deploying-citrix-metaframe-presentation-server-30-with-windows-server-2003-terminal-services" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaste" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(97) "deploying-citrix-metaframe-presentation-server-30-with-windows-server-2003-terminal-services.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Almost 100% of all Fortune 500 and Fortune 1000 companies...

    Rating:
    0%
    £31.99
    Add to Wish List
  53. Host Integrity Monitoring Using Osiris and Samhain object(Magento\Catalog\Model\Product\Interceptor)#14343 (33) { ["entity_id"]=> string(5) "56781" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488943" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:22:40" ["updated_at"]=> string(19) "2025-07-24 09:22:40" ["price"]=> string(9) "28.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "28.990000" ["minimal_price"]=> string(9) "28.990000" ["min_price"]=> string(9) "28.990000" ["max_price"]=> string(9) "28.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(51) ["name"]=> string(50) "Host Integrity Monitoring Using Osiris and Samhain" ["image"]=> string(22) "/9/7/9780080488943.jpg" ["small_image"]=> string(22) "/9/7/9780080488943.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488943.jpg" ["image_label"]=> string(50) "Host Integrity Monitoring Using Osiris and Samhain" ["small_image_label"]=> string(50) "Host Integrity Monitoring Using Osiris and Samhain" ["thumbnail_label"]=> string(50) "Host Integrity Monitoring Using Osiris and Samhain" ["url_key"]=> string(50) "host-integrity-monitoring-using-osiris-and-samhain" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book wil" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "host-integrity-monitoring-using-osiris-and-samhain.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book will walk the reader through the process of...

    Rating:
    0%
    £28.99
    Add to Wish List
  54. InfoSec Career Hacking: Sell Your Skillz, Not Your Soul object(Magento\Catalog\Model\Product\Interceptor)#14344 (33) { ["entity_id"]=> string(5) "56792" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489032" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:22:54" ["updated_at"]=> string(19) "2025-07-24 09:22:54" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(52) ["name"]=> string(55) "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul" ["image"]=> string(22) "/9/7/9780080489032.jpg" ["small_image"]=> string(22) "/9/7/9780080489032.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489032.jpg" ["image_label"]=> string(55) "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul" ["small_image_label"]=> string(55) "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul" ["thumbnail_label"]=> string(55) "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul" ["url_key"]=> string(53) "infosec-career-hacking-sell-your-skillz-not-your-soul" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particul" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(58) "infosec-career-hacking-sell-your-skillz-not-your-soul.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;InfoSec Career Hacking starts out by describing the many, different...

    Rating:
    0%
    £25.99
    Add to Wish List
  55. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft object(Magento\Catalog\Model\Product\Interceptor)#14345 (33) { ["entity_id"]=> string(5) "56795" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489056" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:22:59" ["updated_at"]=> string(19) "2025-07-24 09:22:59" ["price"]=> string(9) "22.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.990000" ["minimal_price"]=> string(9) "22.990000" ["min_price"]=> string(9) "22.990000" ["max_price"]=> string(9) "22.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(53) ["name"]=> string(74) "Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft" ["image"]=> string(22) "/9/7/9780080489056.jpg" ["small_image"]=> string(22) "/9/7/9780080489056.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489056.jpg" ["image_label"]=> string(74) "Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft" ["small_image_label"]=> string(74) "Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft" ["thumbnail_label"]=> string(74) "Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft" ["url_key"]=> string(71) "insider-threat-protecting-the-enterprise-from-sabotage-spying-and-theft" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "e;Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professional" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(76) "insider-threat-protecting-the-enterprise-from-sabotage-spying-and-theft.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team)...

    Rating:
    0%
    £22.99
    Add to Wish List
  56. Network Security Evaluation Using the NSA IEM object(Magento\Catalog\Model\Product\Interceptor)#14346 (33) { ["entity_id"]=> string(5) "56886" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489438" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:34" ["updated_at"]=> string(19) "2025-07-24 09:24:34" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(54) ["name"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["image"]=> string(22) "/9/7/9780080489438.jpg" ["small_image"]=> string(22) "/9/7/9780080489438.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489438.jpg" ["image_label"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["small_image_label"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["thumbnail_label"]=> string(45) "Network Security Evaluation Using the NSA IEM" ["url_key"]=> string(45) "network-security-evaluation-using-the-nsa-iem" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, includ" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "network-security-evaluation-using-the-nsa-iem.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Network Security Evaluation provides a methodology for conducting technical security...

    Rating:
    0%
    £38.99
    Add to Wish List
  57. Phishing Exposed object(Magento\Catalog\Model\Product\Interceptor)#14347 (33) { ["entity_id"]=> string(5) "56936" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489537" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:25:36" ["updated_at"]=> string(19) "2025-07-24 09:25:36" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(55) ["name"]=> string(16) "Phishing Exposed" ["image"]=> string(22) "/9/7/9780080489537.jpg" ["small_image"]=> string(22) "/9/7/9780080489537.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489537.jpg" ["image_label"]=> string(16) "Phishing Exposed" ["small_image_label"]=> string(16) "Phishing Exposed" ["thumbnail_label"]=> string(16) "Phishing Exposed" ["url_key"]=> string(16) "phishing-exposed" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitati" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "phishing-exposed.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Phishing Exposed unveils the techniques phishers employ that enable them...

    Rating:
    0%
    £31.99
    Add to Wish List
  58. Practical VoIP Security object(Magento\Catalog\Model\Product\Interceptor)#14348 (33) { ["entity_id"]=> string(5) "56937" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489551" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:25:38" ["updated_at"]=> string(19) "2025-07-24 09:25:38" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(56) ["name"]=> string(23) "Practical VoIP Security" ["image"]=> string(22) "/9/7/9780080489551.jpg" ["small_image"]=> string(22) "/9/7/9780080489551.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489551.jpg" ["image_label"]=> string(23) "Practical VoIP Security" ["small_image_label"]=> string(23) "Practical VoIP Security" ["thumbnail_label"]=> string(23) "Practical VoIP Security" ["url_key"]=> string(23) "practical-voip-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessib" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "practical-voip-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Voice Over IP (VoIP) phone lines now represent over 50%...

    Rating:
    0%
    £30.99
    Add to Wish List
  59. RFID Security object(Magento\Catalog\Model\Product\Interceptor)#14349 (33) { ["entity_id"]=> string(5) "56965" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489650" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:09" ["updated_at"]=> string(19) "2025-07-24 09:26:09" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(57) ["name"]=> string(13) "RFID Security" ["image"]=> string(22) "/9/7/9780080489650.jpg" ["small_image"]=> string(22) "/9/7/9780080489650.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489650.jpg" ["image_label"]=> string(13) "RFID Security" ["small_image_label"]=> string(13) "RFID Security" ["thumbnail_label"]=> string(13) "RFID Security" ["url_key"]=> string(13) "rfid-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(18) "rfid-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    RFID is a method of remotely storing and receiving data...

    Rating:
    0%
    £31.99
    Add to Wish List
  60. Sarbanes-Oxley Compliance Using COBIT and Open Source Tools object(Magento\Catalog\Model\Product\Interceptor)#14350 (33) { ["entity_id"]=> string(5) "56974" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489674" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:21" ["updated_at"]=> string(19) "2025-07-24 09:26:21" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(58) ["name"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["image"]=> string(22) "/9/7/9780080489674.jpg" ["small_image"]=> string(22) "/9/7/9780080489674.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489674.jpg" ["image_label"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["small_image_label"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["thumbnail_label"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["url_key"]=> string(59) "sarbanes-oxley-compliance-using-cobit-and-open-source-tools" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(64) "sarbanes-oxley-compliance-using-cobit-and-open-source-tools.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book illustrates the many Open Source cost savings opportunities...

    Rating:
    0%
    £31.99
    Add to Wish List
  61. Securing IM and P2P Applications for the Enterprise object(Magento\Catalog\Model\Product\Interceptor)#14351 (33) { ["entity_id"]=> string(5) "56978" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489698" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:24" ["updated_at"]=> string(19) "2025-07-24 09:26:24" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(59) ["name"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["image"]=> string(22) "/9/7/9780080489698.jpg" ["small_image"]=> string(22) "/9/7/9780080489698.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489698.jpg" ["image_label"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["small_image_label"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["thumbnail_label"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["url_key"]=> string(51) "securing-im-and-p2p-applications-for-the-enterprise" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(56) "securing-im-and-p2p-applications-for-the-enterprise.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is for system administrators and security professionals who...

    Rating:
    0%
    £31.99
    Add to Wish List
  62. Skype Me! From Single User to Small Enterprise and Beyond object(Magento\Catalog\Model\Product\Interceptor)#14352 (33) { ["entity_id"]=> string(5) "56979" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489711" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:25" ["updated_at"]=> string(19) "2025-07-24 09:26:25" ["price"]=> string(9) "22.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.990000" ["minimal_price"]=> string(9) "22.990000" ["min_price"]=> string(9) "22.990000" ["max_price"]=> string(9) "22.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(60) ["name"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["image"]=> string(22) "/9/7/9780080489711.jpg" ["small_image"]=> string(22) "/9/7/9780080489711.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489711.jpg" ["image_label"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["small_image_label"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["thumbnail_label"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["url_key"]=> string(56) "skype-me-from-single-user-to-small-enterprise-and-beyond" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn ho" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(61) "skype-me-from-single-user-to-small-enterprise-and-beyond.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is divided into four parts. Part I begins...

    Rating:
    0%
    £22.99
    Add to Wish List
  63. Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives object(Magento\Catalog\Model\Product\Interceptor)#14353 (33) { ["entity_id"]=> string(5) "56696" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488653" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:02" ["updated_at"]=> string(19) "2025-07-24 09:21:02" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(61) ["name"]=> string(67) "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives" ["image"]=> string(22) "/9/7/9780080488653.jpg" ["small_image"]=> string(22) "/9/7/9780080488653.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488653.jpg" ["image_label"]=> string(67) "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives" ["small_image_label"]=> string(67) "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives" ["thumbnail_label"]=> string(67) "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives" ["url_key"]=> string(65) "cyber-spying-tracking-your-family-s-sometimes-secret-online-lives" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reason" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(70) "cyber-spying-tracking-your-family-s-sometimes-secret-online-lives.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows...

    Rating:
    0%
    £25.99
    Add to Wish List
  64. Dictionary of Information Security object(Magento\Catalog\Model\Product\Interceptor)#14354 (33) { ["entity_id"]=> string(5) "56705" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488714" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:14" ["updated_at"]=> string(19) "2025-07-24 09:21:14" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(62) ["name"]=> string(34) "Dictionary of Information Security" ["image"]=> string(22) "/9/7/9780080488714.jpg" ["small_image"]=> string(22) "/9/7/9780080488714.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488714.jpg" ["image_label"]=> string(34) "Dictionary of Information Security" ["small_image_label"]=> string(34) "Dictionary of Information Security" ["thumbnail_label"]=> string(34) "Dictionary of Information Security" ["url_key"]=> string(34) "dictionary-of-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms u" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "dictionary-of-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Dictionary of Information Security is a compilation of security...

    Rating:
    0%
    £19.99
    Add to Wish List
  65. How to Cheat at Designing Security for a Windows Server 2003 Network object(Magento\Catalog\Model\Product\Interceptor)#14355 (33) { ["entity_id"]=> string(5) "56783" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488967" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:22:44" ["updated_at"]=> string(19) "2025-07-24 09:22:44" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(63) ["name"]=> string(68) "How to Cheat at Designing Security for a Windows Server 2003 Network" ["image"]=> string(22) "/9/7/9780080488967.jpg" ["small_image"]=> string(22) "/9/7/9780080488967.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488967.jpg" ["image_label"]=> string(68) "How to Cheat at Designing Security for a Windows Server 2003 Network" ["small_image_label"]=> string(68) "How to Cheat at Designing Security for a Windows Server 2003 Network" ["thumbnail_label"]=> string(68) "How to Cheat at Designing Security for a Windows Server 2003 Network" ["url_key"]=> string(68) "how-to-cheat-at-designing-security-for-a-windows-server-2003-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, a" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(73) "how-to-cheat-at-designing-security-for-a-windows-server-2003-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Windows 2003 Server is unquestionably the dominant enterprise level operating...

    Rating:
    0%
    £25.99
    Add to Wish List
  66. How to Cheat at Configuring ISA Server 2004 object(Magento\Catalog\Model\Product\Interceptor)#14356 (33) { ["entity_id"]=> string(5) "56782" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488950" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:22:43" ["updated_at"]=> string(19) "2025-07-24 09:22:43" ["price"]=> string(9) "22.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.990000" ["minimal_price"]=> string(9) "22.990000" ["min_price"]=> string(9) "22.990000" ["max_price"]=> string(9) "22.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(64) ["name"]=> string(43) "How to Cheat at Configuring ISA Server 2004" ["image"]=> string(22) "/9/7/9780080488950.jpg" ["small_image"]=> string(22) "/9/7/9780080488950.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488950.jpg" ["image_label"]=> string(43) "How to Cheat at Configuring ISA Server 2004" ["small_image_label"]=> string(43) "How to Cheat at Configuring ISA Server 2004" ["thumbnail_label"]=> string(43) "How to Cheat at Configuring ISA Server 2004" ["url_key"]=> string(43) "how-to-cheat-at-configuring-isa-server-2004" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its si" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "how-to-cheat-at-configuring-isa-server-2004.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    How to Cheat at Configuring ISA (Internet Security and Acceleration)...

    Rating:
    0%
    £22.99
    Add to Wish List
  67. Intrusion Prevention and Active Response object(Magento\Catalog\Model\Product\Interceptor)#14357 (33) { ["entity_id"]=> string(5) "56846" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489292" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:23:52" ["updated_at"]=> string(19) "2025-07-24 09:23:52" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(65) ["name"]=> string(40) "Intrusion Prevention and Active Response" ["image"]=> string(22) "/9/7/9780080489292.jpg" ["small_image"]=> string(22) "/9/7/9780080489292.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489292.jpg" ["image_label"]=> string(40) "Intrusion Prevention and Active Response" ["small_image_label"]=> string(40) "Intrusion Prevention and Active Response" ["thumbnail_label"]=> string(40) "Intrusion Prevention and Active Response" ["url_key"]=> string(40) "intrusion-prevention-and-active-response" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS an" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "intrusion-prevention-and-active-response.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Intrusion Prevention and Active Response provides an introduction to the...

    Rating:
    0%
    £31.99
    Add to Wish List
  68. Perfect Password object(Magento\Catalog\Model\Product\Interceptor)#14358 (33) { ["entity_id"]=> string(5) "56926" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489513" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:25:29" ["updated_at"]=> string(19) "2025-07-24 09:25:29" ["price"]=> string(9) "15.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "15.990000" ["minimal_price"]=> string(9) "15.990000" ["min_price"]=> string(9) "15.990000" ["max_price"]=> string(9) "15.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(66) ["name"]=> string(16) "Perfect Password" ["image"]=> string(22) "/9/7/9780080489513.jpg" ["small_image"]=> string(22) "/9/7/9780080489513.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489513.jpg" ["image_label"]=> string(16) "Perfect Password" ["small_image_label"]=> string(16) "Perfect Password" ["thumbnail_label"]=> string(16) "Perfect Password" ["url_key"]=> string(16) "perfect-password" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "perfect-password.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    User passwords are the keys to the network kingdom, yet...

    Rating:
    0%
    £15.99
    Add to Wish List
  69. Configuring SonicWALL Firewalls object(Magento\Catalog\Model\Product\Interceptor)#14359 (33) { ["entity_id"]=> string(5) "56970" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489667" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:17" ["updated_at"]=> string(19) "2025-07-24 09:26:17" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(67) ["name"]=> string(31) "Configuring SonicWALL Firewalls" ["image"]=> string(22) "/9/7/9780080489667.jpg" ["small_image"]=> string(22) "/9/7/9780080489667.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489667.jpg" ["image_label"]=> string(31) "Configuring SonicWALL Firewalls" ["small_image_label"]=> string(31) "Configuring SonicWALL Firewalls" ["thumbnail_label"]=> string(31) "Configuring SonicWALL Firewalls" ["url_key"]=> string(31) "configuring-sonicwall-firewalls" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "configuring-sonicwall-firewalls.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    SonicWALL firewalls are the number 3 in sales worldwide in...

    Rating:
    0%
    £31.99
    Add to Wish List
  70. Writing Security Tools and Exploits object(Magento\Catalog\Model\Product\Interceptor)#14360 (33) { ["entity_id"]=> string(5) "57567" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080493138" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:37:06" ["updated_at"]=> string(19) "2025-07-24 09:37:06" ["price"]=> string(9) "29.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "29.990000" ["minimal_price"]=> string(9) "29.990000" ["min_price"]=> string(9) "29.990000" ["max_price"]=> string(9) "29.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(68) ["name"]=> string(35) "Writing Security Tools and Exploits" ["image"]=> string(22) "/9/7/9780080493138.jpg" ["small_image"]=> string(22) "/9/7/9780080493138.jpg" ["thumbnail"]=> string(22) "/9/7/9780080493138.jpg" ["image_label"]=> string(35) "Writing Security Tools and Exploits" ["small_image_label"]=> string(35) "Writing Security Tools and Exploits" ["thumbnail_label"]=> string(35) "Writing Security Tools and Exploits" ["url_key"]=> string(35) "writing-security-tools-and-exploits" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated ex" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "writing-security-tools-and-exploits.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Writing Security Tools and Exploits will be the foremost authority...

    Rating:
    0%
    £29.99
    Add to Wish List
  71. WarDriving and Wireless Penetration Testing object(Magento\Catalog\Model\Product\Interceptor)#14361 (33) { ["entity_id"]=> string(5) "61479" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080520773" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:56:58" ["updated_at"]=> string(19) "2025-07-24 12:56:58" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(69) ["name"]=> string(43) "WarDriving and Wireless Penetration Testing" ["image"]=> string(22) "/9/7/9780080520773.jpg" ["small_image"]=> string(22) "/9/7/9780080520773.jpg" ["thumbnail"]=> string(22) "/9/7/9780080520773.jpg" ["image_label"]=> string(43) "WarDriving and Wireless Penetration Testing" ["small_image_label"]=> string(43) "WarDriving and Wireless Penetration Testing" ["thumbnail_label"]=> string(43) "WarDriving and Wireless Penetration Testing" ["url_key"]=> string(43) "wardriving-and-wireless-penetration-testing" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and secu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "wardriving-and-wireless-penetration-testing.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Wireless networking has become standard in many business and government...

    Rating:
    0%
    £31.99
    Add to Wish List
  72. How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure object(Magento\Catalog\Model\Product\Interceptor)#14362 (33) { ["entity_id"]=> string(5) "59060" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080500928" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:03:09" ["updated_at"]=> string(19) "2025-07-24 12:03:09" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(70) ["name"]=> string(79) "How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure" ["image"]=> string(22) "/9/7/9780080500928.jpg" ["small_image"]=> string(22) "/9/7/9780080500928.jpg" ["thumbnail"]=> string(22) "/9/7/9780080500928.jpg" ["image_label"]=> string(79) "How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure" ["small_image_label"]=> string(79) "How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure" ["thumbnail_label"]=> string(79) "How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure" ["url_key"]=> string(79) "how-to-cheat-at-designing-a-windows-server-2003-active-directory-infrastructure" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, a" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(84) "how-to-cheat-at-designing-a-windows-server-2003-active-directory-infrastructure.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Windows 2003 Server is unquestionably the dominant enterprise level operating...

    Rating:
    0%
    £25.99
    Add to Wish List
  73. Botnets object(Magento\Catalog\Model\Product\Interceptor)#14363 (33) { ["entity_id"]=> string(5) "58982" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080500232" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:01:42" ["updated_at"]=> string(19) "2025-07-24 12:01:42" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(71) ["name"]=> string(7) "Botnets" ["image"]=> string(22) "/9/7/9780080500232.jpg" ["small_image"]=> string(22) "/9/7/9780080500232.jpg" ["thumbnail"]=> string(22) "/9/7/9780080500232.jpg" ["image_label"]=> string(7) "Botnets" ["small_image_label"]=> string(7) "Botnets" ["thumbnail_label"]=> string(7) "Botnets" ["url_key"]=> string(7) "botnets" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technol" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(12) "botnets.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book begins with real world cases of botnet attacks...

    Rating:
    0%
    £31.99
    Add to Wish List
Filter
Set Descending Direction

Items 73-144 of 620

per page