Books

Filter
Set Descending Direction

Items 145-216 of 620

per page
  1. Innovative Technologies for Future Living object(Magento\Catalog\Model\Product\Interceptor)#13815 (33) { ["entity_id"]=> string(5) "58666" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781000926026" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:56:10" ["updated_at"]=> string(19) "2025-07-24 11:56:10" ["price"]=> string(9) "26.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "26.990000" ["minimal_price"]=> string(9) "26.990000" ["min_price"]=> string(9) "26.990000" ["max_price"]=> string(9) "26.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(41) "Innovative Technologies for Future Living" ["image"]=> string(22) "/9/7/9781000926026.jpg" ["small_image"]=> string(22) "/9/7/9781000926026.jpg" ["thumbnail"]=> string(22) "/9/7/9781000926026.jpg" ["image_label"]=> string(41) "Innovative Technologies for Future Living" ["small_image_label"]=> string(41) "Innovative Technologies for Future Living" ["thumbnail_label"]=> string(41) "Innovative Technologies for Future Living" ["url_key"]=> string(41) "innovative-technologies-for-future-living" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "As of January 2023 there were over 5 billion users of technology and the internet. People who use technology and want to know about it-in simple language, without jargon. Many of those nurture dreams and aspirations to be quicker, smarter and 'be the chan" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "innovative-technologies-for-future-living.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    As of January 2023 there were over 5 billion users...

    Rating:
    0%
    £26.99
    Add to Wish List
  2. Hack the Stack object(Magento\Catalog\Model\Product\Interceptor)#13794 (33) { ["entity_id"]=> string(5) "59137" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080507743" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:04:20" ["updated_at"]=> string(19) "2025-07-24 12:04:20" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(14) "Hack the Stack" ["image"]=> string(22) "/9/7/9780080507743.jpg" ["small_image"]=> string(22) "/9/7/9780080507743.jpg" ["thumbnail"]=> string(22) "/9/7/9780080507743.jpg" ["image_label"]=> string(14) "Hack the Stack" ["small_image_label"]=> string(14) "Hack the Stack" ["thumbnail_label"]=> string(14) "Hack the Stack" ["url_key"]=> string(14) "hack-the-stack" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "e;stack"e; -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and e" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(19) "hack-the-stack.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book looks at network security in a new and...

    Rating:
    0%
    £31.99
    Add to Wish List
  3. Developer's Guide to Web Application Security object(Magento\Catalog\Model\Product\Interceptor)#14325 (33) { ["entity_id"]=> string(5) "59446" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080504094" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:10:14" ["updated_at"]=> string(19) "2025-07-24 12:10:14" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(45) "Developer's Guide to Web Application Security" ["image"]=> string(22) "/9/7/9780080504094.jpg" ["small_image"]=> string(22) "/9/7/9780080504094.jpg" ["thumbnail"]=> string(22) "/9/7/9780080504094.jpg" ["image_label"]=> string(45) "Developer's Guide to Web Application Security" ["small_image_label"]=> string(45) "Developer's Guide to Web Application Security" ["thumbnail_label"]=> string(45) "Developer's Guide to Web Application Security" ["url_key"]=> string(45) "developer-s-guide-to-web-application-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerab" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "developer-s-guide-to-web-application-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Over 75% of network attacks are targeted at the web...

    Rating:
    0%
    £31.99
    Add to Wish List
  4. Combating Spyware in the Enterprise object(Magento\Catalog\Model\Product\Interceptor)#13843 (33) { ["entity_id"]=> string(5) "59863" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080502229" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:19:23" ["updated_at"]=> string(19) "2025-07-24 12:19:23" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(35) "Combating Spyware in the Enterprise" ["image"]=> string(22) "/9/7/9780080502229.jpg" ["small_image"]=> string(22) "/9/7/9780080502229.jpg" ["thumbnail"]=> string(22) "/9/7/9780080502229.jpg" ["image_label"]=> string(35) "Combating Spyware in the Enterprise" ["small_image_label"]=> string(35) "Combating Spyware in the Enterprise" ["thumbnail_label"]=> string(35) "Combating Spyware in the Enterprise" ["url_key"]=> string(35) "combating-spyware-in-the-enterprise" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adwar" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "combating-spyware-in-the-enterprise.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Combating Spyware in the Enterprise is the first book published...

    Rating:
    0%
    £31.99
    Add to Wish List
  5. Data Networks object(Magento\Catalog\Model\Product\Interceptor)#13833 (33) { ["entity_id"]=> string(5) "59305" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080503660" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:07:33" ["updated_at"]=> string(19) "2025-07-24 12:07:33" ["price"]=> string(9) "61.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "61.990000" ["minimal_price"]=> string(9) "61.990000" ["min_price"]=> string(9) "61.990000" ["max_price"]=> string(9) "61.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(13) "Data Networks" ["image"]=> string(22) "/9/7/9780080503660.jpg" ["small_image"]=> string(22) "/9/7/9780080503660.jpg" ["thumbnail"]=> string(22) "/9/7/9780080503660.jpg" ["image_label"]=> string(13) "Data Networks" ["small_image_label"]=> string(13) "Data Networks" ["thumbnail_label"]=> string(13) "Data Networks" ["url_key"]=> string(13) "data-networks" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon pr" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(18) "data-networks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Data Networks builds on the foundation laid in Kenyon's first...

    Rating:
    0%
    £61.99
    Add to Wish List
  6. Configuring Juniper Networks NetScreen and SSG Firewalls object(Magento\Catalog\Model\Product\Interceptor)#13807 (33) { ["entity_id"]=> string(5) "59931" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080502847" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:21:11" ["updated_at"]=> string(19) "2025-07-24 12:21:11" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["image"]=> string(22) "/9/7/9780080502847.jpg" ["small_image"]=> string(22) "/9/7/9780080502847.jpg" ["thumbnail"]=> string(22) "/9/7/9780080502847.jpg" ["image_label"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["small_image_label"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["thumbnail_label"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["url_key"]=> string(56) "configuring-juniper-networks-netscreen-and-ssg-firewalls" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security pro" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(61) "configuring-juniper-networks-netscreen-and-ssg-firewalls.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Juniper Networks Secure Access SSL VPN appliances provide a complete...

    Rating:
    0%
    £30.99
    Add to Wish List
  7. Game Console Hacking object(Magento\Catalog\Model\Product\Interceptor)#13812 (33) { ["entity_id"]=> string(5) "63650" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080532318" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 13:44:45" ["updated_at"]=> string(19) "2025-07-24 13:44:45" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(20) "Game Console Hacking" ["image"]=> string(22) "/9/7/9780080532318.jpg" ["small_image"]=> string(22) "/9/7/9780080532318.jpg" ["thumbnail"]=> string(22) "/9/7/9780080532318.jpg" ["image_label"]=> string(20) "Game Console Hacking" ["small_image_label"]=> string(20) "Game Console Hacking" ["thumbnail_label"]=> string(20) "Game Console Hacking" ["url_key"]=> string(20) "game-console-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "e" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(25) "game-console-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The worldwide video game console market surpassed $10 billion in...

    Rating:
    0%
    £25.99
    Add to Wish List
  8. How to Cheat at Securing a Wireless Network object(Magento\Catalog\Model\Product\Interceptor)#13832 (33) { ["entity_id"]=> string(5) "59993" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080508221" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:22:44" ["updated_at"]=> string(19) "2025-07-24 12:22:44" ["price"]=> string(9) "24.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "24.990000" ["minimal_price"]=> string(9) "24.990000" ["min_price"]=> string(9) "24.990000" ["max_price"]=> string(9) "24.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(43) "How to Cheat at Securing a Wireless Network" ["image"]=> string(22) "/9/7/9780080508221.jpg" ["small_image"]=> string(22) "/9/7/9780080508221.jpg" ["thumbnail"]=> string(22) "/9/7/9780080508221.jpg" ["image_label"]=> string(43) "How to Cheat at Securing a Wireless Network" ["small_image_label"]=> string(43) "How to Cheat at Securing a Wireless Network" ["thumbnail_label"]=> string(43) "How to Cheat at Securing a Wireless Network" ["url_key"]=> string(43) "how-to-cheat-at-securing-a-wireless-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "how-to-cheat-at-securing-a-wireless-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Wireless connectivity is now a reality in most businesses. Yet...

    Rating:
    0%
    £24.99
    Add to Wish List
  9. Joe Grand's Best of Hardware, Wireless, and Game Console Hacking object(Magento\Catalog\Model\Product\Interceptor)#13831 (33) { ["entity_id"]=> string(5) "60115" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080509662" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:25:34" ["updated_at"]=> string(19) "2025-07-24 12:25:34" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["image"]=> string(22) "/9/7/9780080509662.jpg" ["small_image"]=> string(22) "/9/7/9780080509662.jpg" ["thumbnail"]=> string(22) "/9/7/9780080509662.jpg" ["image_label"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["small_image_label"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["thumbnail_label"]=> string(64) "Joe Grand's Best of Hardware, Wireless, and Game Console Hacking" ["url_key"]=> string(62) "joe-grand-s-best-of-hardware-wireless-and-game-console-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(67) "joe-grand-s-best-of-hardware-wireless-and-game-console-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book introduces the principles of hardware design and describes...

    Rating:
    0%
    £19.99
    Add to Wish List
  10. Secure Your Network for Free object(Magento\Catalog\Model\Product\Interceptor)#13830 (33) { ["entity_id"]=> string(5) "60207" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080516813" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:27:31" ["updated_at"]=> string(19) "2025-07-24 12:27:31" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(28) "Secure Your Network for Free" ["image"]=> string(22) "/9/7/9780080516813.jpg" ["small_image"]=> string(22) "/9/7/9780080516813.jpg" ["thumbnail"]=> string(22) "/9/7/9780080516813.jpg" ["image_label"]=> string(28) "Secure Your Network for Free" ["small_image_label"]=> string(28) "Secure Your Network for Free" ["thumbnail_label"]=> string(28) "Secure Your Network for Free" ["url_key"]=> string(28) "secure-your-network-for-free" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to ge" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "secure-your-network-for-free.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only book to clearly demonstrate how to...

    Rating:
    0%
    £25.99
    Add to Wish List
  11. Stealing the Network: How to Own an Identity object(Magento\Catalog\Model\Product\Interceptor)#13829 (33) { ["entity_id"]=> string(5) "61117" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080517742" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:48:24" ["updated_at"]=> string(19) "2025-07-24 12:48:24" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(44) "Stealing the Network: How to Own an Identity" ["image"]=> string(22) "/9/7/9780080517742.jpg" ["small_image"]=> string(22) "/9/7/9780080517742.jpg" ["thumbnail"]=> string(22) "/9/7/9780080517742.jpg" ["image_label"]=> string(44) "Stealing the Network: How to Own an Identity" ["small_image_label"]=> string(44) "Stealing the Network: How to Own an Identity" ["thumbnail_label"]=> string(44) "Stealing the Network: How to Own an Identity" ["url_key"]=> string(43) "stealing-the-network-how-to-own-an-identity" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The first two books in this series "e;Stealing the Network: How to Own the Box and "e;Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of crimi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "stealing-the-network-how-to-own-an-identity.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The first two books in this series "e;Stealing the Network:...

    Rating:
    0%
    £25.99
    Add to Wish List
  12. Zero-Day Exploit object(Magento\Catalog\Model\Product\Interceptor)#13828 (33) { ["entity_id"]=> string(5) "66169" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080543925" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:40:27" ["updated_at"]=> string(19) "2025-07-24 14:40:27" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(16) "Zero-Day Exploit" ["image"]=> string(22) "/9/7/9780080543925.jpg" ["small_image"]=> string(22) "/9/7/9780080543925.jpg" ["thumbnail"]=> string(22) "/9/7/9780080543925.jpg" ["image_label"]=> string(16) "Zero-Day Exploit" ["small_image_label"]=> string(16) "Zero-Day Exploit" ["thumbnail_label"]=> string(16) "Zero-Day Exploit" ["url_key"]=> string(16) "zero-day-exploit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "e;Zero-Day"e; attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and refere" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "zero-day-exploit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The realistic portrayals of researching, developing, and ultimately defending the...

    Rating:
    0%
    £31.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. XSS Attacks object(Magento\Catalog\Model\Product\Interceptor)#13827 (33) { ["entity_id"]=> string(5) "66848" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553405" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:55:22" ["updated_at"]=> string(19) "2025-07-24 14:55:22" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(11) "XSS Attacks" ["image"]=> string(22) "/9/7/9780080553405.jpg" ["small_image"]=> string(22) "/9/7/9780080553405.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553405.jpg" ["image_label"]=> string(11) "XSS Attacks" ["small_image_label"]=> string(11) "XSS Attacks" ["thumbnail_label"]=> string(11) "XSS Attacks" ["url_key"]=> string(11) "xss-attacks" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It assume" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(16) "xss-attacks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A cross site scripting attack is a very specific type...

    Rating:
    0%
    £38.99
    Add to Wish List
  15. How to Cheat at IIS 7 Server Administration object(Magento\Catalog\Model\Product\Interceptor)#13826 (33) { ["entity_id"]=> string(5) "66894" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553542" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:56:31" ["updated_at"]=> string(19) "2025-07-24 14:56:31" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["image"]=> string(22) "/9/7/9780080553542.jpg" ["small_image"]=> string(22) "/9/7/9780080553542.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553542.jpg" ["image_label"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["small_image_label"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["thumbnail_label"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["url_key"]=> string(43) "how-to-cheat-at-iis-7-server-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "how-to-cheat-at-iis-7-server-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    According to Microsoft, Internet Information Services (IIS) 7.0 is a...

    Rating:
    0%
    £31.99
    Add to Wish List
  16. How to Cheat at Configuring Open Source Security Tools object(Magento\Catalog\Model\Product\Interceptor)#13825 (33) { ["entity_id"]=> string(5) "66896" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553566" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:56:34" ["updated_at"]=> string(19) "2025-07-24 14:56:34" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(54) "How to Cheat at Configuring Open Source Security Tools" ["image"]=> string(22) "/9/7/9780080553566.jpg" ["small_image"]=> string(22) "/9/7/9780080553566.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553566.jpg" ["image_label"]=> string(54) "How to Cheat at Configuring Open Source Security Tools" ["small_image_label"]=> string(54) "How to Cheat at Configuring Open Source Security Tools" ["thumbnail_label"]=> string(54) "How to Cheat at Configuring Open Source Security Tools" ["url_key"]=> string(54) "how-to-cheat-at-configuring-open-source-security-tools" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "how-to-cheat-at-configuring-open-source-security-tools.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Perfect Reference for the Multitasked SysAdminThis is the perfect...

    Rating:
    0%
    £31.99
    Add to Wish List
  17. How to Cheat at Configuring Exchange Server 2007 object(Magento\Catalog\Model\Product\Interceptor)#13824 (33) { ["entity_id"]=> string(5) "66961" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554204" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:58:04" ["updated_at"]=> string(19) "2025-07-24 14:58:04" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["image"]=> string(22) "/9/7/9780080554204.jpg" ["small_image"]=> string(22) "/9/7/9780080554204.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554204.jpg" ["image_label"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["small_image_label"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["thumbnail_label"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["url_key"]=> string(48) "how-to-cheat-at-configuring-exchange-server-2007" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will pr" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "how-to-cheat-at-configuring-exchange-server-2007.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Perfect Reference for the Multitasked System AdministratorsThe new version...

    Rating:
    0%
    £25.99
    Add to Wish List
  18. Snort Intrusion Detection and Prevention Toolkit object(Magento\Catalog\Model\Product\Interceptor)#13823 (33) { ["entity_id"]=> string(5) "66371" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080549279" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:44:55" ["updated_at"]=> string(19) "2025-07-24 14:44:55" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["image"]=> string(22) "/9/7/9780080549279.jpg" ["small_image"]=> string(22) "/9/7/9780080549279.jpg" ["thumbnail"]=> string(22) "/9/7/9780080549279.jpg" ["image_label"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["small_image_label"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["thumbnail_label"]=> string(48) "Snort Intrusion Detection and Prevention Toolkit" ["url_key"]=> string(48) "snort-intrusion-detection-and-prevention-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of S" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "snort-intrusion-detection-and-prevention-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This all new book covering the brand new Snort version...

    Rating:
    0%
    £30.99
    Add to Wish List
  19. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research object(Magento\Catalog\Model\Product\Interceptor)#13822 (33) { ["entity_id"]=> string(5) "66370" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080549255" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:44:53" ["updated_at"]=> string(19) "2025-07-24 14:44:53" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["image"]=> string(22) "/9/7/9780080549255.jpg" ["small_image"]=> string(22) "/9/7/9780080549255.jpg" ["thumbnail"]=> string(22) "/9/7/9780080549255.jpg" ["image_label"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["small_image_label"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["thumbnail_label"]=> string(91) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research" ["url_key"]=> string(89) "metasploit-toolkit-for-penetration-testing-exploit-development-and-vulnerability-research" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penet" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(94) "metasploit-toolkit-for-penetration-testing-exploit-development-and-vulnerability-research.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research...

    Rating:
    0%
    £38.99
    Add to Wish List
  20. How to Cheat at VoIP Security object(Magento\Catalog\Model\Product\Interceptor)#13821 (33) { ["entity_id"]=> string(5) "66868" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553535" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:55:51" ["updated_at"]=> string(19) "2025-07-24 14:55:51" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(29) "How to Cheat at VoIP Security" ["image"]=> string(22) "/9/7/9780080553535.jpg" ["small_image"]=> string(22) "/9/7/9780080553535.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553535.jpg" ["image_label"]=> string(29) "How to Cheat at VoIP Security" ["small_image_label"]=> string(29) "How to Cheat at VoIP Security" ["thumbnail_label"]=> string(29) "How to Cheat at VoIP Security" ["url_key"]=> string(29) "how-to-cheat-at-voip-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. I" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "how-to-cheat-at-voip-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Perfect Reference for the Multitasked SysAdminThis is the perfect...

    Rating:
    0%
    £31.99
    Add to Wish List
  21. Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators object(Magento\Catalog\Model\Product\Interceptor)#13820 (33) { ["entity_id"]=> string(5) "66935" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553979" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:57:25" ["updated_at"]=> string(19) "2025-07-24 14:57:25" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(19) ["name"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["image"]=> string(22) "/9/7/9780080553979.jpg" ["small_image"]=> string(22) "/9/7/9780080553979.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553979.jpg" ["image_label"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["small_image_label"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["thumbnail_label"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["url_key"]=> string(84) "techno-security-s-guide-to-managing-risks-for-it-managers-auditors-and-investigators" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(89) "techno-security-s-guide-to-managing-risks-for-it-managers-auditors-and-investigators.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;This book contains some of the most up-to-date information available...

    Rating:
    0%
    £38.99
    Add to Wish List
  22. Building Robots with LEGO Mindstorms NXT object(Magento\Catalog\Model\Product\Interceptor)#13819 (33) { ["entity_id"]=> string(5) "66981" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554334" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:58:38" ["updated_at"]=> string(19) "2025-07-24 14:58:38" ["price"]=> string(9) "24.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "24.990000" ["minimal_price"]=> string(9) "24.990000" ["min_price"]=> string(9) "24.990000" ["max_price"]=> string(9) "24.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(20) ["name"]=> string(40) "Building Robots with LEGO Mindstorms NXT" ["image"]=> string(22) "/9/7/9780080554334.jpg" ["small_image"]=> string(22) "/9/7/9780080554334.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554334.jpg" ["image_label"]=> string(40) "Building Robots with LEGO Mindstorms NXT" ["small_image_label"]=> string(40) "Building Robots with LEGO Mindstorms NXT" ["thumbnail_label"]=> string(40) "Building Robots with LEGO Mindstorms NXT" ["url_key"]=> string(40) "building-robots-with-lego-mindstorms-nxt" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Ultimate Tool for MINDSTORMS(R) ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show h" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "building-robots-with-lego-mindstorms-nxt.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Ultimate Tool for MINDSTORMS(R) ManiacsThe new MINDSTORMS kit has...

    Rating:
    0%
    £24.99
    Add to Wish List
  23. How to Cheat at Administering Office Communications Server 2007 object(Magento\Catalog\Model\Product\Interceptor)#13808 (33) { ["entity_id"]=> string(5) "67720" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558639" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:14:34" ["updated_at"]=> string(19) "2025-07-24 15:14:34" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(21) ["name"]=> string(63) "How to Cheat at Administering Office Communications Server 2007" ["image"]=> string(22) "/9/7/9780080558639.jpg" ["small_image"]=> string(22) "/9/7/9780080558639.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558639.jpg" ["image_label"]=> string(63) "How to Cheat at Administering Office Communications Server 2007" ["small_image_label"]=> string(63) "How to Cheat at Administering Office Communications Server 2007" ["thumbnail_label"]=> string(63) "How to Cheat at Administering Office Communications Server 2007" ["url_key"]=> string(63) "how-to-cheat-at-administering-office-communications-server-2007" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(68) "how-to-cheat-at-administering-office-communications-server-2007.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version...

    Rating:
    0%
    £31.99
    Add to Wish List
  24. Netcat Power Tools object(Magento\Catalog\Model\Product\Interceptor)#13811 (33) { ["entity_id"]=> string(5) "54723" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558738" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:33:28" ["updated_at"]=> string(19) "2025-07-24 15:14:38" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(22) ["name"]=> string(18) "Netcat Power Tools" ["image"]=> string(24) "/9/7/9780080558738_1.jpg" ["small_image"]=> string(24) "/9/7/9780080558738_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080558738_1.jpg" ["image_label"]=> string(18) "Netcat Power Tools" ["small_image_label"]=> string(18) "Netcat Power Tools" ["thumbnail_label"]=> string(18) "Netcat Power Tools" ["url_key"]=> string(18) "netcat-power-tools" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often ref" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(23) "netcat-power-tools.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Originally released in 1996, Netcat is a netowrking program designed...

    Rating:
    0%
    £36.99
    Add to Wish List
  25. AVIEN Malware Defense Guide for the Enterprise object(Magento\Catalog\Model\Product\Interceptor)#13817 (33) { ["entity_id"]=> string(5) "67721" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558660" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:14:37" ["updated_at"]=> string(19) "2025-07-24 15:14:37" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(23) ["name"]=> string(46) "AVIEN Malware Defense Guide for the Enterprise" ["image"]=> string(22) "/9/7/9780080558660.jpg" ["small_image"]=> string(22) "/9/7/9780080558660.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558660.jpg" ["image_label"]=> string(46) "AVIEN Malware Defense Guide for the Enterprise" ["small_image_label"]=> string(46) "AVIEN Malware Defense Guide for the Enterprise" ["thumbnail_label"]=> string(46) "AVIEN Malware Defense Guide for the Enterprise" ["url_key"]=> string(46) "avien-malware-defense-guide-for-the-enterprise" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that eve" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(51) "avien-malware-defense-guide-for-the-enterprise.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Members of AVIEN (the Anti-Virus Information Exchange Network) have been...

    Rating:
    0%
    £38.99
    Add to Wish List
  26. Nmap in the Enterprise object(Magento\Catalog\Model\Product\Interceptor)#13814 (33) { ["entity_id"]=> string(5) "67722" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558745" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:14:40" ["updated_at"]=> string(19) "2025-07-24 15:14:40" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(24) ["name"]=> string(22) "Nmap in the Enterprise" ["image"]=> string(22) "/9/7/9780080558745.jpg" ["small_image"]=> string(22) "/9/7/9780080558745.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558745.jpg" ["image_label"]=> string(22) "Nmap in the Enterprise" ["small_image_label"]=> string(22) "Nmap in the Enterprise" ["thumbnail_label"]=> string(22) "Nmap in the Enterprise" ["url_key"]=> string(22) "nmap-in-the-enterprise" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate netwo" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(27) "nmap-in-the-enterprise.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Nmap, or Network Mapper, is a free, open source tool...

    Rating:
    0%
    £38.99
    Add to Wish List
  27. How to Cheat at Securing Your Network object(Magento\Catalog\Model\Product\Interceptor)#13809 (33) { ["entity_id"]=> string(5) "67726" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558646" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:14:47" ["updated_at"]=> string(19) "2025-07-24 15:14:47" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(25) ["name"]=> string(37) "How to Cheat at Securing Your Network" ["image"]=> string(22) "/9/7/9780080558646.jpg" ["small_image"]=> string(22) "/9/7/9780080558646.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558646.jpg" ["image_label"]=> string(37) "How to Cheat at Securing Your Network" ["small_image_label"]=> string(37) "How to Cheat at Securing Your Network" ["thumbnail_label"]=> string(37) "How to Cheat at Securing Your Network" ["url_key"]=> string(37) "how-to-cheat-at-securing-your-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "how-to-cheat-at-securing-your-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Most Systems Administrators are not security specialists. Keeping the network...

    Rating:
    0%
    £31.99
    Add to Wish List
  28. Desinformationsangriffe auf Unternehmen abwehren object(Magento\Catalog\Model\Product\Interceptor)#13818 (27) { ["entity_id"]=> string(5) "67761" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783658437558" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:15:35" ["updated_at"]=> string(19) "2025-07-24 15:15:37" ["price"]=> string(9) "43.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "43.990000" ["minimal_price"]=> string(9) "43.990000" ["min_price"]=> string(9) "43.990000" ["max_price"]=> string(9) "43.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(26) ["name"]=> string(48) "Desinformationsangriffe auf Unternehmen abwehren" ["image_label"]=> string(48) "Desinformationsangriffe auf Unternehmen abwehren" ["url_key"]=> string(48) "desinformationsangriffe-auf-unternehmen-abwehren" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(261) "

    Spätestens seit den massiven Desinformationsangriffen auf westliche Impfstoffhersteller während der Coronapandemie ist klar: Gezielt gestreute „Fake News“ haben sich vom politischen in den wirtschaftlichen Raum ausgebreitet und Unternehmen werden sich " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "desinformationsangriffe-auf-unternehmen-abwehren.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Spätestens seit den massiven Desinformationsangriffen auf westliche Impfstoffhersteller während der...

    Rating:
    0%
    £43.99
    Add to Wish List
  29. InfoSecurity 2008 Threat Analysis object(Magento\Catalog\Model\Product\Interceptor)#13795 (33) { ["entity_id"]=> string(5) "67774" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558691" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:04" ["updated_at"]=> string(19) "2025-07-24 15:16:04" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(27) ["name"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["image"]=> string(22) "/9/7/9780080558691.jpg" ["small_image"]=> string(22) "/9/7/9780080558691.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558691.jpg" ["image_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["small_image_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["thumbnail_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["url_key"]=> string(33) "infosecurity-2008-threat-analysis" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing en" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "infosecurity-2008-threat-analysis.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    An all-star cast of authors analyze the top IT security...

    Rating:
    0%
    £38.99
    Add to Wish List
  30. How to Cheat at Securing Linux object(Magento\Catalog\Model\Product\Interceptor)#13816 (33) { ["entity_id"]=> string(5) "67773" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558684" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:02" ["updated_at"]=> string(19) "2025-07-24 15:16:02" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(28) ["name"]=> string(30) "How to Cheat at Securing Linux" ["image"]=> string(22) "/9/7/9780080558684.jpg" ["small_image"]=> string(22) "/9/7/9780080558684.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558684.jpg" ["image_label"]=> string(30) "How to Cheat at Securing Linux" ["small_image_label"]=> string(30) "How to Cheat at Securing Linux" ["thumbnail_label"]=> string(30) "How to Cheat at Securing Linux" ["url_key"]=> string(30) "how-to-cheat-at-securing-linux" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "how-to-cheat-at-securing-linux.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Linux servers now account for 33% of all networks servers...

    Rating:
    0%
    £31.99
    Add to Wish List
  31. Managing Catastrophic Loss of Sensitive Data object(Magento\Catalog\Model\Product\Interceptor)#14320 (33) { ["entity_id"]=> string(5) "67776" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558714" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:07" ["updated_at"]=> string(19) "2025-07-24 15:16:07" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(29) ["name"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["image"]=> string(22) "/9/7/9780080558714.jpg" ["small_image"]=> string(22) "/9/7/9780080558714.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558714.jpg" ["image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["small_image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["thumbnail_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["url_key"]=> string(44) "managing-catastrophic-loss-of-sensitive-data" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadma" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "managing-catastrophic-loss-of-sensitive-data.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Offering a structured approach to handling and recovering from a...

    Rating:
    0%
    £38.99
    Add to Wish List
  32. Best Damn Windows Server 2008 Book Period object(Magento\Catalog\Model\Product\Interceptor)#14321 (33) { ["entity_id"]=> string(5) "67894" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080560076" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:19:26" ["updated_at"]=> string(19) "2025-07-24 15:19:26" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(30) ["name"]=> string(41) "Best Damn Windows Server 2008 Book Period" ["image"]=> string(22) "/9/7/9780080560076.jpg" ["small_image"]=> string(22) "/9/7/9780080560076.jpg" ["thumbnail"]=> string(22) "/9/7/9780080560076.jpg" ["image_label"]=> string(41) "Best Damn Windows Server 2008 Book Period" ["small_image_label"]=> string(41) "Best Damn Windows Server 2008 Book Period" ["thumbnail_label"]=> string(41) "Best Damn Windows Server 2008 Book Period" ["url_key"]=> string(41) "best-damn-windows-server-2008-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualizatio" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "best-damn-windows-server-2008-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Best Damn Windows Server 2008 Book Period, Second Edition is...

    Rating:
    0%
    £36.99
    Add to Wish List
  33. Malware Forensics object(Magento\Catalog\Model\Product\Interceptor)#14323 (33) { ["entity_id"]=> string(5) "67905" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080560199" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:19:41" ["updated_at"]=> string(19) "2025-07-24 15:19:41" ["price"]=> string(9) "42.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "42.990000" ["minimal_price"]=> string(9) "42.990000" ["min_price"]=> string(9) "42.990000" ["max_price"]=> string(9) "42.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(31) ["name"]=> string(17) "Malware Forensics" ["image"]=> string(22) "/9/7/9780080560199.jpg" ["small_image"]=> string(22) "/9/7/9780080560199.jpg" ["thumbnail"]=> string(22) "/9/7/9780080560199.jpg" ["image_label"]=> string(17) "Malware Forensics" ["small_image_label"]=> string(17) "Malware Forensics" ["thumbnail_label"]=> string(17) "Malware Forensics" ["url_key"]=> string(17) "malware-forensics" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evol" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "malware-forensics.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Malware Forensics: Investigating and Analyzing Malicious Code covers the complete...

    Rating:
    0%
    £42.99
    Add to Wish List
  34. Network Security: Know It All object(Magento\Catalog\Model\Product\Interceptor)#14327 (33) { ["entity_id"]=> string(5) "67908" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080560151" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:19:47" ["updated_at"]=> string(19) "2025-07-24 15:19:47" ["price"]=> string(9) "56.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "56.990000" ["minimal_price"]=> string(9) "56.990000" ["min_price"]=> string(9) "56.990000" ["max_price"]=> string(9) "56.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(32) ["name"]=> string(29) "Network Security: Know It All" ["image"]=> string(22) "/9/7/9780080560151.jpg" ["small_image"]=> string(22) "/9/7/9780080560151.jpg" ["thumbnail"]=> string(22) "/9/7/9780080560151.jpg" ["image_label"]=> string(29) "Network Security: Know It All" ["small_image_label"]=> string(29) "Network Security: Know It All" ["thumbnail_label"]=> string(29) "Network Security: Know It All" ["url_key"]=> string(28) "network-security-know-it-all" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-t" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "network-security-know-it-all.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Network Security: Know It All explains the basics, describes the...

    Rating:
    0%
    £56.99
    Add to Wish List
  35. Nagios 3 Enterprise Network Monitoring object(Magento\Catalog\Model\Product\Interceptor)#14326 (33) { ["entity_id"]=> string(5) "67915" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080560182" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:19:55" ["updated_at"]=> string(19) "2025-07-24 15:19:55" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(33) ["name"]=> string(38) "Nagios 3 Enterprise Network Monitoring" ["image"]=> string(22) "/9/7/9780080560182.jpg" ["small_image"]=> string(22) "/9/7/9780080560182.jpg" ["thumbnail"]=> string(22) "/9/7/9780080560182.jpg" ["image_label"]=> string(38) "Nagios 3 Enterprise Network Monitoring" ["small_image_label"]=> string(38) "Nagios 3 Enterprise Network Monitoring" ["thumbnail_label"]=> string(38) "Nagios 3 Enterprise Network Monitoring" ["url_key"]=> string(38) "nagios-3-enterprise-network-monitoring" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "nagios-3-enterprise-network-monitoring.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The future for Nagios in the enterprise is certainly bright!...

    Rating:
    0%
    £31.99
    Add to Wish List
  36. Integrating ISA Server 2006 with Microsoft Exchange 2007 object(Magento\Catalog\Model\Product\Interceptor)#14328 (33) { ["entity_id"]=> string(5) "67916" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080560205" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:19:57" ["updated_at"]=> string(19) "2025-07-24 15:19:57" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(34) ["name"]=> string(56) "Integrating ISA Server 2006 with Microsoft Exchange 2007" ["image"]=> string(22) "/9/7/9780080560205.jpg" ["small_image"]=> string(22) "/9/7/9780080560205.jpg" ["thumbnail"]=> string(22) "/9/7/9780080560205.jpg" ["image_label"]=> string(56) "Integrating ISA Server 2006 with Microsoft Exchange 2007" ["small_image_label"]=> string(56) "Integrating ISA Server 2006 with Microsoft Exchange 2007" ["thumbnail_label"]=> string(56) "Integrating ISA Server 2006 with Microsoft Exchange 2007" ["url_key"]=> string(56) "integrating-isa-server-2006-with-microsoft-exchange-2007" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "e;comprehensive resources"e; it doesn't waste time re-hashing general information on the architectures and pu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(61) "integrating-isa-server-2006-with-microsoft-exchange-2007.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is a convenient, targeted, single-source guide to integrating...

    Rating:
    0%
    £31.99
    Add to Wish List
  37. Dr. Tom Shinder's ISA Server 2006 Migration Guide object(Magento\Catalog\Model\Product\Interceptor)#14329 (33) { ["entity_id"]=> string(5) "67253" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555515" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:03:50" ["updated_at"]=> string(19) "2025-07-24 15:03:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(35) ["name"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["image"]=> string(22) "/9/7/9780080555515.jpg" ["small_image"]=> string(22) "/9/7/9780080555515.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555515.jpg" ["image_label"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["small_image_label"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["thumbnail_label"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["url_key"]=> string(48) "dr-tom-shinder-s-isa-server-2006-migration-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of th" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "dr-tom-shinder-s-isa-server-2006-migration-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a...

    Rating:
    0%
    £31.99
    Add to Wish List
  38. How to Cheat at Securing SQL Server 2005 object(Magento\Catalog\Model\Product\Interceptor)#14330 (33) { ["entity_id"]=> string(5) "67260" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555546" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:03:58" ["updated_at"]=> string(19) "2025-07-24 15:03:58" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(36) ["name"]=> string(40) "How to Cheat at Securing SQL Server 2005" ["image"]=> string(22) "/9/7/9780080555546.jpg" ["small_image"]=> string(22) "/9/7/9780080555546.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555546.jpg" ["image_label"]=> string(40) "How to Cheat at Securing SQL Server 2005" ["small_image_label"]=> string(40) "How to Cheat at Securing SQL Server 2005" ["thumbnail_label"]=> string(40) "How to Cheat at Securing SQL Server 2005" ["url_key"]=> string(40) "how-to-cheat-at-securing-sql-server-2005" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficul" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "how-to-cheat-at-securing-sql-server-2005.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The perfect book for multi-tasked IT managers responsible for securing...

    Rating:
    0%
    £31.99
    Add to Wish List
  39. Open Source Fuzzing Tools object(Magento\Catalog\Model\Product\Interceptor)#14331 (33) { ["entity_id"]=> string(5) "67265" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555614" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:06" ["updated_at"]=> string(19) "2025-07-24 15:04:06" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(37) ["name"]=> string(25) "Open Source Fuzzing Tools" ["image"]=> string(22) "/9/7/9780080555614.jpg" ["small_image"]=> string(22) "/9/7/9780080555614.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555614.jpg" ["image_label"]=> string(25) "Open Source Fuzzing Tools" ["small_image_label"]=> string(25) "Open Source Fuzzing Tools" ["thumbnail_label"]=> string(25) "Open Source Fuzzing Tools" ["url_key"]=> string(25) "open-source-fuzzing-tools" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Fuzzing is often described as a "e;black box software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program error" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "open-source-fuzzing-tools.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Fuzzing is often described as a "e;black box software testing...

    Rating:
    0%
    £38.99
    Add to Wish List
  40. Linksys WRT54G Ultimate Hacking object(Magento\Catalog\Model\Product\Interceptor)#14332 (33) { ["entity_id"]=> string(5) "67333" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556130" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:05:53" ["updated_at"]=> string(19) "2025-07-24 15:05:53" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(38) ["name"]=> string(31) "Linksys WRT54G Ultimate Hacking" ["image"]=> string(22) "/9/7/9780080556130.jpg" ["small_image"]=> string(22) "/9/7/9780080556130.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556130.jpg" ["image_label"]=> string(31) "Linksys WRT54G Ultimate Hacking" ["small_image_label"]=> string(31) "Linksys WRT54G Ultimate Hacking" ["thumbnail_label"]=> string(31) "Linksys WRT54G Ultimate Hacking" ["url_key"]=> string(31) "linksys-wrt54g-ultimate-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, th" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "linksys-wrt54g-ultimate-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book will teach the reader how to make the...

    Rating:
    0%
    £25.99
    Add to Wish List
  41. Alternate Data Storage Forensics object(Magento\Catalog\Model\Product\Interceptor)#14333 (33) { ["entity_id"]=> string(5) "67048" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554754" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:00:09" ["updated_at"]=> string(19) "2025-07-24 15:00:09" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(39) ["name"]=> string(32) "Alternate Data Storage Forensics" ["image"]=> string(22) "/9/7/9780080554754.jpg" ["small_image"]=> string(22) "/9/7/9780080554754.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554754.jpg" ["image_label"]=> string(32) "Alternate Data Storage Forensics" ["small_image_label"]=> string(32) "Alternate Data Storage Forensics" ["thumbnail_label"]=> string(32) "Alternate Data Storage Forensics" ["url_key"]=> string(32) "alternate-data-storage-forensics" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Learn to pull "e;digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics tech" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "alternate-data-storage-forensics.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Learn to pull "e;digital fingerprints from alternate data storage (ADS)...

    Rating:
    0%
    £38.99
    Add to Wish List
  42. Juniper(r) Networks Secure Access SSL VPN Configuration Guide object(Magento\Catalog\Model\Product\Interceptor)#14334 (33) { ["entity_id"]=> string(5) "67388" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556635" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:07:08" ["updated_at"]=> string(19) "2025-07-24 15:07:08" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(40) ["name"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["image"]=> string(22) "/9/7/9780080556635.jpg" ["small_image"]=> string(22) "/9/7/9780080556635.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556635.jpg" ["image_label"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["small_image_label"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["thumbnail_label"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["url_key"]=> string(60) "juniper-r-networks-secure-access-ssl-vpn-configuration-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration gui" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(65) "juniper-r-networks-secure-access-ssl-vpn-configuration-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Juniper Networks Secure Access SSL VPN appliances provide a complete...

    Rating:
    0%
    £38.99
    Add to Wish List
  43. Web Application Vulnerabilities object(Magento\Catalog\Model\Product\Interceptor)#14335 (33) { ["entity_id"]=> string(5) "67391" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556642" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:07:14" ["updated_at"]=> string(19) "2025-07-24 15:07:14" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(41) ["name"]=> string(31) "Web Application Vulnerabilities" ["image"]=> string(22) "/9/7/9780080556642.jpg" ["small_image"]=> string(22) "/9/7/9780080556642.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556642.jpg" ["image_label"]=> string(31) "Web Application Vulnerabilities" ["small_image_label"]=> string(31) "Web Application Vulnerabilities" ["thumbnail_label"]=> string(31) "Web Application Vulnerabilities" ["url_key"]=> string(31) "web-application-vulnerabilities" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to e" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "web-application-vulnerabilities.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In this book, we aim to describe how to make...

    Rating:
    0%
    £38.99
    Add to Wish List
  44. Mastering Information Security Compliance Management object(Magento\Catalog\Model\Product\Interceptor)#14336 (27) { ["entity_id"]=> string(5) "53972" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781803243160" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:21:04" ["updated_at"]=> string(19) "2025-07-24 08:21:04" ["price"]=> string(9) "23.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "23.990000" ["minimal_price"]=> string(9) "23.990000" ["min_price"]=> string(9) "23.990000" ["max_price"]=> string(9) "23.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(42) ["name"]=> string(52) "Mastering Information Security Compliance Management" ["image_label"]=> string(52) "Mastering Information Security Compliance Management" ["url_key"]=> string(52) "mastering-information-security-compliance-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standardsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesFamiliarize yoursel" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(57) "mastering-information-security-compliance-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Strengthen your ability to implement, assess, evaluate, and enhance the...

    Rating:
    0%
    £23.99
    Add to Wish List
  45. Cloud Defense Strategies with Azure Sentinel object(Magento\Catalog\Model\Product\Interceptor)#14337 (27) { ["entity_id"]=> string(5) "52506" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484271322" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:57:03" ["updated_at"]=> string(19) "2025-07-24 07:57:03" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(43) ["name"]=> string(44) "Cloud Defense Strategies with Azure Sentinel" ["image_label"]=> string(44) "Cloud Defense Strategies with Azure Sentinel" ["url_key"]=> string(44) "cloud-defense-strategies-with-azure-sentinel" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active D" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "cloud-defense-strategies-with-azure-sentinel.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Use various defense strategies with Azure Sentinel to enhance your cloud...

    Rating:
    0%
    £54.99
    Add to Wish List
  46. Identity Attack Vectors object(Magento\Catalog\Model\Product\Interceptor)#14338 (27) { ["entity_id"]=> string(5) "52548" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484251652" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:58:00" ["updated_at"]=> string(19) "2025-07-24 07:58:00" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(44) ["name"]=> string(23) "Identity Attack Vectors" ["image_label"]=> string(23) "Identity Attack Vectors" ["url_key"]=> string(23) "identity-attack-vectors" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "identity-attack-vectors.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Discover how poor identity and privilege management can be leveraged...

    Rating:
    0%
    £39.99
    Add to Wish List
  47. Integrated Security Systems Design object(Magento\Catalog\Model\Product\Interceptor)#14340 (33) { ["entity_id"]=> string(5) "52948" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080471440" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:04:40" ["updated_at"]=> string(19) "2025-07-24 08:04:40" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(46) ["name"]=> string(34) "Integrated Security Systems Design" ["image"]=> string(22) "/9/7/9780080471440.jpg" ["small_image"]=> string(22) "/9/7/9780080471440.jpg" ["thumbnail"]=> string(22) "/9/7/9780080471440.jpg" ["image_label"]=> string(34) "Integrated Security Systems Design" ["small_image_label"]=> string(34) "Integrated Security Systems Design" ["thumbnail_label"]=> string(34) "Integrated Security Systems Design" ["url_key"]=> string(34) "integrated-security-systems-design" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An inte" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "integrated-security-systems-design.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Integrated Security Systems Design is a one-stop resource for...

    Rating:
    0%
    £37.99
    Add to Wish List
  48. Seven Deadliest Web Application Attacks object(Magento\Catalog\Model\Product\Interceptor)#14341 (27) { ["entity_id"]=> string(5) "52029" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781597495448" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:49:31" ["updated_at"]=> string(19) "2025-07-24 07:49:31" ["price"]=> string(9) "15.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "15.990000" ["minimal_price"]=> string(9) "15.990000" ["min_price"]=> string(9) "15.990000" ["max_price"]=> string(9) "15.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(47) ["name"]=> string(39) "Seven Deadliest Web Application Attacks" ["image_label"]=> string(39) "Seven Deadliest Web Application Attacks" ["url_key"]=> string(39) "seven-deadliest-web-application-attacks" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out th" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "seven-deadliest-web-application-attacks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Seven Deadliest Web Application Attacks highlights the vagaries of web...

    Rating:
    0%
    £15.99
    Add to Wish List
  49. Bulletproof Wireless Security object(Magento\Catalog\Model\Product\Interceptor)#14342 (33) { ["entity_id"]=> string(5) "55202" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476315" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:20" ["updated_at"]=> string(19) "2025-07-24 08:42:20" ["price"]=> string(9) "43.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "43.990000" ["minimal_price"]=> string(9) "43.990000" ["min_price"]=> string(9) "43.990000" ["max_price"]=> string(9) "43.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(48) ["name"]=> string(29) "Bulletproof Wireless Security" ["image"]=> string(22) "/9/7/9780080476315.jpg" ["small_image"]=> string(22) "/9/7/9780080476315.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476315.jpg" ["image_label"]=> string(29) "Bulletproof Wireless Security" ["small_image_label"]=> string(29) "Bulletproof Wireless Security" ["thumbnail_label"]=> string(29) "Bulletproof Wireless Security" ["url_key"]=> string(29) "bulletproof-wireless-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Finally--a single volume guide to really effective security for both voice and data wireless networks!More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "e;bul" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "bulletproof-wireless-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Finally--a single volume guide to really effective security for both...

    Rating:
    0%
    £43.99
    Add to Wish List
  50. Configuring Windows 2000 without Active Directory object(Magento\Catalog\Model\Product\Interceptor)#14343 (33) { ["entity_id"]=> string(5) "55273" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476728" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:43:43" ["updated_at"]=> string(19) "2025-07-24 08:43:43" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(49) ["name"]=> string(49) "Configuring Windows 2000 without Active Directory" ["image"]=> string(22) "/9/7/9780080476728.jpg" ["small_image"]=> string(22) "/9/7/9780080476728.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476728.jpg" ["image_label"]=> string(49) "Configuring Windows 2000 without Active Directory" ["small_image_label"]=> string(49) "Configuring Windows 2000 without Active Directory" ["thumbnail_label"]=> string(49) "Configuring Windows 2000 without Active Directory" ["url_key"]=> string(49) "configuring-windows-2000-without-active-directory" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Eliminate the hassles of Active Directory - install Windows 2000 without it!Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising its impressive ab" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(54) "configuring-windows-2000-without-active-directory.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Eliminate the hassles of Active Directory - install Windows 2000...

    Rating:
    0%
    £31.99
    Add to Wish List
  51. How to Cheat at Managing Windows Small Business Server 2003 object(Magento\Catalog\Model\Product\Interceptor)#14344 (33) { ["entity_id"]=> string(5) "55595" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478388" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:59:56" ["updated_at"]=> string(19) "2025-07-24 08:59:56" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(50) ["name"]=> string(59) "How to Cheat at Managing Windows Small Business Server 2003" ["image"]=> string(22) "/9/7/9780080478388.jpg" ["small_image"]=> string(22) "/9/7/9780080478388.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478388.jpg" ["image_label"]=> string(59) "How to Cheat at Managing Windows Small Business Server 2003" ["small_image_label"]=> string(59) "How to Cheat at Managing Windows Small Business Server 2003" ["thumbnail_label"]=> string(59) "How to Cheat at Managing Windows Small Business Server 2003" ["url_key"]=> string(59) "how-to-cheat-at-managing-windows-small-business-server-2003" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shutt" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(64) "how-to-cheat-at-managing-windows-small-business-server-2003.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    How to Cheat at Managing Windows Small Business Server 2003...

    Rating:
    0%
    £31.99
    Add to Wish List
  52. On the Road to Resilience object(Magento\Catalog\Model\Product\Interceptor)#14345 (33) { ["entity_id"]=> string(5) "55737" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781040117217" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:02:52" ["updated_at"]=> string(19) "2025-07-24 09:02:52" ["price"]=> string(9) "47.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "47.990000" ["minimal_price"]=> string(9) "47.990000" ["min_price"]=> string(9) "47.990000" ["max_price"]=> string(9) "47.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(51) ["name"]=> string(25) "On the Road to Resilience" ["image"]=> string(22) "/9/7/9781040117217.jpg" ["small_image"]=> string(22) "/9/7/9781040117217.jpg" ["thumbnail"]=> string(22) "/9/7/9781040117217.jpg" ["image_label"]=> string(25) "On the Road to Resilience" ["small_image_label"]=> string(25) "On the Road to Resilience" ["thumbnail_label"]=> string(25) "On the Road to Resilience" ["url_key"]=> string(25) "on-the-road-to-resilience" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book delves into the critical realm of trust management within the Internet of Vehicles (IOV) networks, exploring its multifaceted implications on safety and security which forms part of the intelligent transportation system domain.IoV emerges as a p" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "on-the-road-to-resilience.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book delves into the critical realm of trust management...

    Rating:
    0%
    £47.99
    Add to Wish List
  53. Hack Proofing Linux object(Magento\Catalog\Model\Product\Interceptor)#14346 (33) { ["entity_id"]=> string(5) "55536" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478111" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:48" ["updated_at"]=> string(19) "2025-07-24 08:58:48" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(52) ["name"]=> string(19) "Hack Proofing Linux" ["image"]=> string(22) "/9/7/9780080478111.jpg" ["small_image"]=> string(22) "/9/7/9780080478111.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478111.jpg" ["image_label"]=> string(19) "Hack Proofing Linux" ["small_image_label"]=> string(19) "Hack Proofing Linux" ["thumbnail_label"]=> string(19) "Hack Proofing Linux" ["url_key"]=> string(19) "hack-proofing-linux" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrator" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "hack-proofing-linux.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the authors of the bestselling E-Mail Virus Protection Handbook!The...

    Rating:
    0%
    £31.99
    Add to Wish List
  54. Hack Proofing Sun Solaris 8 object(Magento\Catalog\Model\Product\Interceptor)#14347 (33) { ["entity_id"]=> string(5) "55537" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478128" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:49" ["updated_at"]=> string(19) "2025-07-24 08:58:49" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(53) ["name"]=> string(27) "Hack Proofing Sun Solaris 8" ["image"]=> string(22) "/9/7/9780080478128.jpg" ["small_image"]=> string(22) "/9/7/9780080478128.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478128.jpg" ["image_label"]=> string(27) "Hack Proofing Sun Solaris 8" ["small_image_label"]=> string(27) "Hack Proofing Sun Solaris 8" ["thumbnail_label"]=> string(27) "Hack Proofing Sun Solaris 8" ["url_key"]=> string(27) "hack-proofing-sun-solaris-8" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(32) "hack-proofing-sun-solaris-8.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £38.99
    Add to Wish List
  55. Hack Proofing Your Network object(Magento\Catalog\Model\Product\Interceptor)#14348 (33) { ["entity_id"]=> string(5) "55541" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478166" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:54" ["updated_at"]=> string(19) "2025-07-24 08:58:54" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(54) ["name"]=> string(26) "Hack Proofing Your Network" ["image"]=> string(22) "/9/7/9780080478166.jpg" ["small_image"]=> string(22) "/9/7/9780080478166.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478166.jpg" ["image_label"]=> string(26) "Hack Proofing Your Network" ["small_image_label"]=> string(26) "Hack Proofing Your Network" ["thumbnail_label"]=> string(26) "Hack Proofing Your Network" ["url_key"]=> string(26) "hack-proofing-your-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A new edition the most popular Hack Proofing book around!IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(31) "hack-proofing-your-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A new edition the most popular Hack Proofing book around!IT...

    Rating:
    0%
    £30.99
    Add to Wish List
  56. Inside the SPAM Cartel object(Magento\Catalog\Model\Product\Interceptor)#14349 (33) { ["entity_id"]=> string(5) "55613" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478500" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:00:21" ["updated_at"]=> string(19) "2025-07-24 09:00:21" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(55) ["name"]=> string(22) "Inside the SPAM Cartel" ["image"]=> string(22) "/9/7/9780080478500.jpg" ["small_image"]=> string(22) "/9/7/9780080478500.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478500.jpg" ["image_label"]=> string(22) "Inside the SPAM Cartel" ["small_image_label"]=> string(22) "Inside the SPAM Cartel" ["thumbnail_label"]=> string(22) "Inside the SPAM Cartel" ["url_key"]=> string(22) "inside-the-spam-cartel" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "e;You may" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(27) "inside-the-spam-cartel.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Authored by a former spammer, Inside the SPAM Cartel is...

    Rating:
    0%
    £31.99
    Add to Wish List
  57. Ruby Developers Guide object(Magento\Catalog\Model\Product\Interceptor)#14350 (33) { ["entity_id"]=> string(5) "56167" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480763" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:11" ["updated_at"]=> string(19) "2025-07-24 09:11:11" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(56) ["name"]=> string(21) "Ruby Developers Guide" ["image"]=> string(22) "/9/7/9780080480763.jpg" ["small_image"]=> string(22) "/9/7/9780080480763.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480763.jpg" ["image_label"]=> string(21) "Ruby Developers Guide" ["small_image_label"]=> string(21) "Ruby Developers Guide" ["thumbnail_label"]=> string(21) "Ruby Developers Guide" ["url_key"]=> string(21) "ruby-developers-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "An expert guide to Ruby, a popular new Object-Oriented Programming LanguageRuby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programmi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(26) "ruby-developers-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    An expert guide to Ruby, a popular new Object-Oriented Programming...

    Rating:
    0%
    £31.99
    Add to Wish List
  58. Aggressive Network Self-Defense object(Magento\Catalog\Model\Product\Interceptor)#14351 (33) { ["entity_id"]=> string(5) "56602" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488295" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:18:50" ["updated_at"]=> string(19) "2025-07-24 09:18:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(57) ["name"]=> string(31) "Aggressive Network Self-Defense" ["image"]=> string(22) "/9/7/9780080488295.jpg" ["small_image"]=> string(22) "/9/7/9780080488295.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488295.jpg" ["image_label"]=> string(31) "Aggressive Network Self-Defense" ["small_image_label"]=> string(31) "Aggressive Network Self-Defense" ["thumbnail_label"]=> string(31) "Aggressive Network Self-Defense" ["url_key"]=> string(31) "aggressive-network-self-defense" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reachin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "aggressive-network-self-defense.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Over the past year there has been a shift within...

    Rating:
    0%
    £31.99
    Add to Wish List
  59. Security Assessment object(Magento\Catalog\Model\Product\Interceptor)#14352 (33) { ["entity_id"]=> string(5) "56171" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480824" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:17" ["updated_at"]=> string(19) "2025-07-24 09:11:17" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(58) ["name"]=> string(19) "Security Assessment" ["image"]=> string(22) "/9/7/9780080480824.jpg" ["small_image"]=> string(22) "/9/7/9780080480824.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480824.jpg" ["image_label"]=> string(19) "Security Assessment" ["small_image_label"]=> string(19) "Security Assessment" ["thumbnail_label"]=> string(19) "Security Assessment" ["url_key"]=> string(19) "security-assessment" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "security-assessment.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines...

    Rating:
    0%
    £44.99
    Add to Wish List
  60. SSCP Systems Security Certified Practitioner Study Guide and DVD Training System object(Magento\Catalog\Model\Product\Interceptor)#14353 (33) { ["entity_id"]=> string(5) "56183" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481074" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:31" ["updated_at"]=> string(19) "2025-07-24 09:11:31" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(59) ["name"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["image"]=> string(22) "/9/7/9780080481074.jpg" ["small_image"]=> string(22) "/9/7/9780080481074.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481074.jpg" ["image_label"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["small_image_label"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["thumbnail_label"]=> string(80) "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System" ["url_key"]=> string(80) "sscp-systems-security-certified-practitioner-study-guide-and-dvd-training-system" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC)2 official" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(85) "sscp-systems-security-certified-practitioner-study-guide-and-dvd-training-system.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The SSCP Study Guide and DVD Training System is a...

    Rating:
    0%
    £39.99
    Add to Wish List
  61. Wireless Hacking: Projects for Wi-Fi Enthusiasts object(Magento\Catalog\Model\Product\Interceptor)#14354 (33) { ["entity_id"]=> string(5) "56440" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481784" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:15:48" ["updated_at"]=> string(19) "2025-07-24 09:15:48" ["price"]=> string(9) "26.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "26.990000" ["minimal_price"]=> string(9) "26.990000" ["min_price"]=> string(9) "26.990000" ["max_price"]=> string(9) "26.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(60) ["name"]=> string(48) "Wireless Hacking: Projects for Wi-Fi Enthusiasts" ["image"]=> string(22) "/9/7/9780080481784.jpg" ["small_image"]=> string(22) "/9/7/9780080481784.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481784.jpg" ["image_label"]=> string(48) "Wireless Hacking: Projects for Wi-Fi Enthusiasts" ["small_image_label"]=> string(48) "Wireless Hacking: Projects for Wi-Fi Enthusiasts" ["thumbnail_label"]=> string(48) "Wireless Hacking: Projects for Wi-Fi Enthusiasts" ["url_key"]=> string(47) "wireless-hacking-projects-for-wi-fi-enthusiasts" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--whi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(52) "wireless-hacking-projects-for-wi-fi-enthusiasts.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Sales of wireless LANs to home users and small businesses...

    Rating:
    0%
    £26.99
    Add to Wish List
  62. Windows to Linux Migration Toolkit object(Magento\Catalog\Model\Product\Interceptor)#14355 (33) { ["entity_id"]=> string(5) "56439" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481760" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:15:47" ["updated_at"]=> string(19) "2025-07-24 09:15:47" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(61) ["name"]=> string(34) "Windows to Linux Migration Toolkit" ["image"]=> string(22) "/9/7/9780080481760.jpg" ["small_image"]=> string(22) "/9/7/9780080481760.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481760.jpg" ["image_label"]=> string(34) "Windows to Linux Migration Toolkit" ["small_image_label"]=> string(34) "Windows to Linux Migration Toolkit" ["thumbnail_label"]=> string(34) "Windows to Linux Migration Toolkit" ["url_key"]=> string(34) "windows-to-linux-migration-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. I" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "windows-to-linux-migration-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book will teach people how to migrate systems from...

    Rating:
    0%
    £32.99
    Add to Wish List
  63. Buffer Overflow Attacks object(Magento\Catalog\Model\Product\Interceptor)#14356 (33) { ["entity_id"]=> string(5) "56648" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488424" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:19:57" ["updated_at"]=> string(19) "2025-07-24 09:19:57" ["price"]=> string(9) "22.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.990000" ["minimal_price"]=> string(9) "22.990000" ["min_price"]=> string(9) "22.990000" ["max_price"]=> string(9) "22.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(62) ["name"]=> string(23) "Buffer Overflow Attacks" ["image"]=> string(22) "/9/7/9780080488424.jpg" ["small_image"]=> string(22) "/9/7/9780080488424.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488424.jpg" ["image_label"]=> string(23) "Buffer Overflow Attacks" ["small_image_label"]=> string(23) "Buffer Overflow Attacks" ["thumbnail_label"]=> string(23) "Buffer Overflow Attacks" ["url_key"]=> string(23) "buffer-overflow-attacks" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The SANS Institute maintains a list of the "e;Top 10 Software Vulnerabilities."e; At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dange" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "buffer-overflow-attacks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The SANS Institute maintains a list of the "e;Top 10...

    Rating:
    0%
    £22.99
    Add to Wish List
  64. Enterprise Directory and Security Implementation Guide object(Magento\Catalog\Model\Product\Interceptor)#14357 (33) { ["entity_id"]=> string(5) "57844" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080491264" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:41:32" ["updated_at"]=> string(19) "2025-07-24 09:41:32" ["price"]=> string(9) "51.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "51.990000" ["minimal_price"]=> string(9) "51.990000" ["min_price"]=> string(9) "51.990000" ["max_price"]=> string(9) "51.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(63) ["name"]=> string(54) "Enterprise Directory and Security Implementation Guide" ["image"]=> string(22) "/9/7/9780080491264.jpg" ["small_image"]=> string(22) "/9/7/9780080491264.jpg" ["thumbnail"]=> string(22) "/9/7/9780080491264.jpg" ["image_label"]=> string(54) "Enterprise Directory and Security Implementation Guide" ["small_image_label"]=> string(54) "Enterprise Directory and Security Implementation Guide" ["thumbnail_label"]=> string(54) "Enterprise Directory and Security Implementation Guide" ["url_key"]=> string(54) "enterprise-directory-and-security-implementation-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "e;hackers."e; If the directory str" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "enterprise-directory-and-security-implementation-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Internet is connecting enterprises into a global economy. Companies...

    Rating:
    0%
    £51.99
    Add to Wish List
  65. Bug Bounty from Scratch object(Magento\Catalog\Model\Product\Interceptor)#14358 (27) { ["entity_id"]=> string(5) "57988" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781803239521" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:44:10" ["updated_at"]=> string(19) "2025-07-24 09:44:10" ["price"]=> string(9) "23.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "23.990000" ["minimal_price"]=> string(9) "23.990000" ["min_price"]=> string(9) "23.990000" ["max_price"]=> string(9) "23.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(64) ["name"]=> string(23) "Bug Bounty from Scratch" ["image_label"]=> string(23) "Bug Bounty from Scratch" ["url_key"]=> string(23) "bug-bounty-from-scratch" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key FeaturesPrepare to participate in a bug bounty programDiscover your first bug and claim your reward upon successful detectionGo through core sec" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "bug-bounty-from-scratch.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Embark on your bug bounty journey by gaining practical skills...

    Rating:
    0%
    £23.99
    Add to Wish List
  66. Security Log Management object(Magento\Catalog\Model\Product\Interceptor)#14359 (33) { ["entity_id"]=> string(5) "56897" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489704" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:50" ["updated_at"]=> string(19) "2025-07-24 09:24:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(65) ["name"]=> string(23) "Security Log Management" ["image"]=> string(22) "/9/7/9780080489704.jpg" ["small_image"]=> string(22) "/9/7/9780080489704.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489704.jpg" ["image_label"]=> string(23) "Security Log Management" ["small_image_label"]=> string(23) "Security Log Management" ["thumbnail_label"]=> string(23) "Security Log Management" ["url_key"]=> string(23) "security-log-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "security-log-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book teaches IT professionals how to analyze, manage, and...

    Rating:
    0%
    £31.99
    Add to Wish List
  67. How to Cheat at Managing Windows Server Update Services object(Magento\Catalog\Model\Product\Interceptor)#14360 (33) { ["entity_id"]=> string(5) "56785" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488981" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:22:47" ["updated_at"]=> string(19) "2025-07-24 09:22:47" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(66) ["name"]=> string(55) "How to Cheat at Managing Windows Server Update Services" ["image"]=> string(22) "/9/7/9780080488981.jpg" ["small_image"]=> string(22) "/9/7/9780080488981.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488981.jpg" ["image_label"]=> string(55) "How to Cheat at Managing Windows Server Update Services" ["small_image_label"]=> string(55) "How to Cheat at Managing Windows Server Update Services" ["thumbnail_label"]=> string(55) "How to Cheat at Managing Windows Server Update Services" ["url_key"]=> string(55) "how-to-cheat-at-managing-windows-server-update-services" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of W" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(60) "how-to-cheat-at-managing-windows-server-update-services.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Over 95% of computers around the world are running at...

    Rating:
    0%
    £25.99
    Add to Wish List
  68. Microsoft Log Parser Toolkit object(Magento\Catalog\Model\Product\Interceptor)#14361 (33) { ["entity_id"]=> string(5) "56874" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489391" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:23" ["updated_at"]=> string(19) "2025-07-24 09:24:23" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(67) ["name"]=> string(28) "Microsoft Log Parser Toolkit" ["image"]=> string(22) "/9/7/9780080489391.jpg" ["small_image"]=> string(22) "/9/7/9780080489391.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489391.jpg" ["image_label"]=> string(28) "Microsoft Log Parser Toolkit" ["small_image_label"]=> string(28) "Microsoft Log Parser Toolkit" ["thumbnail_label"]=> string(28) "Microsoft Log Parser Toolkit" ["url_key"]=> string(28) "microsoft-log-parser-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "microsoft-log-parser-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by Microsoft's Log Parser developer, this is the first...

    Rating:
    0%
    £25.99
    Add to Wish List
  69. Software Piracy Exposed object(Magento\Catalog\Model\Product\Interceptor)#14362 (33) { ["entity_id"]=> string(5) "56988" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489735" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:35" ["updated_at"]=> string(19) "2025-07-24 09:26:35" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(68) ["name"]=> string(23) "Software Piracy Exposed" ["image"]=> string(22) "/9/7/9780080489735.jpg" ["small_image"]=> string(22) "/9/7/9780080489735.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489735.jpg" ["image_label"]=> string(23) "Software Piracy Exposed" ["small_image_label"]=> string(23) "Software Piracy Exposed" ["thumbnail_label"]=> string(23) "Software Piracy Exposed" ["url_key"]=> string(23) "software-piracy-exposed" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. S" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "software-piracy-exposed.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is about software piracy--what it is and how...

    Rating:
    0%
    £25.99
    Add to Wish List
  70. Wireless Operational Security object(Magento\Catalog\Model\Product\Interceptor)#14363 (33) { ["entity_id"]=> string(5) "61561" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080521190" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:58:46" ["updated_at"]=> string(19) "2025-07-24 12:58:46" ["price"]=> string(9) "56.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "56.990000" ["minimal_price"]=> string(9) "56.990000" ["min_price"]=> string(9) "56.990000" ["max_price"]=> string(9) "56.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(69) ["name"]=> string(29) "Wireless Operational Security" ["image"]=> string(22) "/9/7/9780080521190.jpg" ["small_image"]=> string(22) "/9/7/9780080521190.jpg" ["thumbnail"]=> string(22) "/9/7/9780080521190.jpg" ["image_label"]=> string(29) "Wireless Operational Security" ["small_image_label"]=> string(29) "Wireless Operational Security" ["thumbnail_label"]=> string(29) "Wireless Operational Security" ["url_key"]=> string(29) "wireless-operational-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and requir" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "wireless-operational-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This comprehensive wireless network book addresses the operational and day-to-day...

    Rating:
    0%
    £56.99
    Add to Wish List
  71. Windows Server 2003 Security Infrastructures object(Magento\Catalog\Model\Product\Interceptor)#14364 (33) { ["entity_id"]=> string(5) "61558" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080521121" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:58:41" ["updated_at"]=> string(19) "2025-07-24 12:58:41" ["price"]=> string(9) "56.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "56.990000" ["minimal_price"]=> string(9) "56.990000" ["min_price"]=> string(9) "56.990000" ["max_price"]=> string(9) "56.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(70) ["name"]=> string(44) "Windows Server 2003 Security Infrastructures" ["image"]=> string(22) "/9/7/9780080521121.jpg" ["small_image"]=> string(22) "/9/7/9780080521121.jpg" ["thumbnail"]=> string(22) "/9/7/9780080521121.jpg" ["image_label"]=> string(44) "Windows Server 2003 Security Infrastructures" ["small_image_label"]=> string(44) "Windows Server 2003 Security Infrastructures" ["thumbnail_label"]=> string(44) "Windows Server 2003 Security Infrastructures" ["url_key"]=> string(44) "windows-server-2003-security-infrastructures" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastruct" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "windows-server-2003-security-infrastructures.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Windows Server 2003 Security Infrastructures is a must for anyone...

    Rating:
    0%
    £56.99
    Add to Wish List
  72. Advanced ASP.NET Core 8 Security object(Magento\Catalog\Model\Product\Interceptor)#14365 (27) { ["entity_id"]=> string(5) "59141" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9798868804946" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:04:25" ["updated_at"]=> string(19) "2025-07-24 12:04:25" ["price"]=> string(9) "49.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "49.990000" ["minimal_price"]=> string(9) "49.990000" ["min_price"]=> string(9) "49.990000" ["max_price"]=> string(9) "49.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(71) ["name"]=> string(32) "Advanced ASP.NET Core 8 Security" ["image_label"]=> string(32) "Advanced ASP.NET Core 8 Security" ["url_key"]=> string(31) "advanced-aspnet-core-8-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the fram" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "advanced-aspnet-core-8-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Most .NET developers do not incorporate security best practices when...

    Rating:
    0%
    £49.99
    Add to Wish List
Filter
Set Descending Direction

Items 145-216 of 620

per page