Books

Filter
Set Descending Direction

Items 1-72 of 122

Page
per page
  1. Biometrics object(Magento\Catalog\Model\Product\Interceptor)#18118 (33) { ["entity_id"]=> string(5) "49529" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072230307" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:54" ["updated_at"]=> string(19) "2025-07-24 06:46:59" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(10) "Biometrics" ["image"]=> string(24) "/9/7/9780072230307_1.jpg" ["small_image"]=> string(24) "/9/7/9780072230307_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072230307_1.jpg" ["image_label"]=> string(10) "Biometrics" ["small_image_label"]=> string(10) "Biometrics" ["thumbnail_label"]=> string(10) "Biometrics" ["url_key"]=> string(10) "biometrics" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Discover how to make biometrics -- the technology involving scanning and analyzing unique body characteristics and matching them against information stored in a database -- a part of your overall security plan with this hands-on guide. Includes deployment" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(15) "biometrics.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Discover how to make biometrics -- the technology involving scanning...

    Rating:
    0%
    £54.90
    Add to Wish List
  2. Windows(R) XP Professional Security object(Magento\Catalog\Model\Product\Interceptor)#18097 (33) { ["entity_id"]=> string(5) "49535" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072230345" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:38:05" ["updated_at"]=> string(19) "2025-07-24 06:47:08" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(35) "Windows(R) XP Professional Security" ["image"]=> string(24) "/9/7/9780072230345_1.jpg" ["small_image"]=> string(24) "/9/7/9780072230345_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072230345_1.jpg" ["image_label"]=> string(35) "Windows(R) XP Professional Security" ["small_image_label"]=> string(35) "Windows(R) XP Professional Security" ["thumbnail_label"]=> string(35) "Windows(R) XP Professional Security" ["url_key"]=> string(34) "windows-r-xp-professional-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(234) "Get comprehensive coverage of XP Professional security with this definitive and focused resource. Work with firewalls and intrusion detection systems, fully utilize XP's built-in support tools, manage security remotely, and much more." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "windows-r-xp-professional-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Get comprehensive coverage of XP Professional security with this definitive...

    Rating:
    0%
    £54.90
    Add to Wish List
  3. Security Planning and Disaster Recovery object(Magento\Catalog\Model\Product\Interceptor)#18548 (33) { ["entity_id"]=> string(5) "49664" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228304" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:41:06" ["updated_at"]=> string(19) "2025-07-24 06:50:03" ["price"]=> string(9) "39.560000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.560000" ["minimal_price"]=> string(9) "39.560000" ["min_price"]=> string(9) "39.560000" ["max_price"]=> string(9) "39.560000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(39) "Security Planning and Disaster Recovery" ["image"]=> string(24) "/9/7/9780072228304_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228304_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228304_1.jpg" ["image_label"]=> string(39) "Security Planning and Disaster Recovery" ["small_image_label"]=> string(39) "Security Planning and Disaster Recovery" ["thumbnail_label"]=> string(39) "Security Planning and Disaster Recovery" ["url_key"]=> string(39) "security-planning-and-disaster-recovery" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "security-planning-and-disaster-recovery.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Proactively implement a successful security and disaster recovery plan--before a...

    Rating:
    0%
    £39.56
    Add to Wish List
  4. SpringerBriefs in Cybersecurity object(Magento\Catalog\Model\Product\Interceptor)#18146 (27) { ["entity_id"]=> string(5) "49750" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783030136901" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:43:18" ["updated_at"]=> string(19) "2025-07-24 06:52:02" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(31) "SpringerBriefs in Cybersecurity" ["image_label"]=> string(31) "SpringerBriefs in Cybersecurity" ["url_key"]=> string(31) "springerbriefs-in-cybersecurity" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend compu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "springerbriefs-in-cybersecurity.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book describes the methodologies and tools used to conduct...

    Rating:
    0%
    £54.99
    Add to Wish List
  5. RSA Security's Official Guide to Cryptography object(Magento\Catalog\Model\Product\Interceptor)#18136 (33) { ["entity_id"]=> string(5) "49523" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072192254" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:45" ["updated_at"]=> string(19) "2025-07-24 06:46:51" ["price"]=> string(9) "54.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.000000" ["minimal_price"]=> string(9) "54.000000" ["min_price"]=> string(9) "54.000000" ["max_price"]=> string(9) "54.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(45) "RSA Security's Official Guide to Cryptography" ["image"]=> string(24) "/9/7/9780072192254_1.jpg" ["small_image"]=> string(24) "/9/7/9780072192254_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072192254_1.jpg" ["image_label"]=> string(45) "RSA Security's Official Guide to Cryptography" ["small_image_label"]=> string(45) "RSA Security's Official Guide to Cryptography" ["thumbnail_label"]=> string(45) "RSA Security's Official Guide to Cryptography" ["url_key"]=> string(45) "rsa-security-s-official-guide-to-cryptography" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security--the most trusted nam" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "rsa-security-s-official-guide-to-cryptography.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Want to keep your Web site safe? Learn how to...

    Rating:
    0%
    £54.00
    Add to Wish List
  6. Advances in Information Security object(Magento\Catalog\Model\Product\Interceptor)#18110 (27) { ["entity_id"]=> string(5) "49853" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031268458" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:45:07" ["updated_at"]=> string(19) "2025-07-24 06:53:55" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(32) "Advances in Information Security" ["image_label"]=> string(32) "Advances in Information Security" ["url_key"]=> string(32) "advances-in-information-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending org" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "advances-in-information-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    In today's digital transformation environments, a rigorous cybersecurity approach to...

    Rating:
    0%
    £54.99
    Add to Wish List
  7. Big Data Management object(Magento\Catalog\Model\Product\Interceptor)#18115 (27) { ["entity_id"]=> string(5) "49918" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9789811675669" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:46:10" ["updated_at"]=> string(19) "2025-07-24 06:54:56" ["price"]=> string(10) "119.500000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "119.500000" ["minimal_price"]=> string(10) "119.500000" ["min_price"]=> string(10) "119.500000" ["max_price"]=> string(10) "119.500000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(19) "Big Data Management" ["image_label"]=> string(19) "Big Data Management" ["url_key"]=> string(19) "big-data-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "The development of information technology has made it possible to collect large amounts of spatial data on a daily basis. It is of enormous significance when it comes to discovering implicit, non-trivial and potentially valuable information from this spat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "big-data-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The development of information technology has made it possible to...

    Rating:
    0%
    £119.50
    Add to Wish List
  8. AI Embedded Assurance for Cyber Systems object(Magento\Catalog\Model\Product\Interceptor)#18135 (27) { ["entity_id"]=> string(5) "50790" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031426377" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 19:02:27" ["updated_at"]=> string(19) "2025-07-24 07:11:12" ["price"]=> string(10) "119.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "119.990000" ["minimal_price"]=> string(10) "119.990000" ["min_price"]=> string(10) "119.990000" ["max_price"]=> string(10) "119.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(39) "AI Embedded Assurance for Cyber Systems" ["image_label"]=> string(39) "AI Embedded Assurance for Cyber Systems" ["url_key"]=> string(39) "ai-embedded-assurance-for-cyber-systems" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the secu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "ai-embedded-assurance-for-cyber-systems.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The rapid growth and reliance on cyber systems have permeated...

    Rating:
    0%
    £119.99
    Add to Wish List
  9. Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities object(Magento\Catalog\Model\Product\Interceptor)#18134 (33) { ["entity_id"]=> string(5) "53790" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781040252383" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:18:10" ["updated_at"]=> string(19) "2025-07-24 08:18:10" ["price"]=> string(9) "49.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "49.990000" ["minimal_price"]=> string(9) "49.990000" ["min_price"]=> string(9) "49.990000" ["max_price"]=> string(9) "49.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["image"]=> string(22) "/9/7/9781040252383.jpg" ["small_image"]=> string(22) "/9/7/9781040252383.jpg" ["thumbnail"]=> string(22) "/9/7/9781040252383.jpg" ["image_label"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["small_image_label"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["thumbnail_label"]=> string(76) "Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities" ["url_key"]=> string(76) "artificial-intelligence-and-iot-for-cyber-security-solutions-in-smart-cities" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk assessmen" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(81) "artificial-intelligence-and-iot-for-cyber-security-solutions-in-smart-cities.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book offers a comprehensive overview of the current state...

    Rating:
    0%
    £49.99
    Add to Wish List
  10. Segment Routing in MPLS Networks object(Magento\Catalog\Model\Product\Interceptor)#18133 (27) { ["entity_id"]=> string(5) "52503" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781836203209" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:57:01" ["updated_at"]=> string(19) "2025-07-24 07:57:01" ["price"]=> string(9) "23.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "23.990000" ["minimal_price"]=> string(9) "23.990000" ["min_price"]=> string(9) "23.990000" ["max_price"]=> string(9) "23.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(32) "Segment Routing in MPLS Networks" ["image_label"]=> string(32) "Segment Routing in MPLS Networks" ["url_key"]=> string(32) "segment-routing-in-mpls-networks" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Unlock the power of segment routing (SR-MPLS) and fast reroute (FRR) techniques through immersive hands-on labs to revolutionize your understanding and implementation of next-gen MPLS protocolKey FeaturesCarry out practical labs to thoroughly grasp and ex" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "segment-routing-in-mpls-networks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Unlock the power of segment routing (SR-MPLS) and fast reroute...

    Rating:
    0%
    £23.99
    Add to Wish List
  11. Cloud Forensics Demystified object(Magento\Catalog\Model\Product\Interceptor)#18132 (27) { ["entity_id"]=> string(5) "53124" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781800560833" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:07:30" ["updated_at"]=> string(19) "2025-07-24 08:07:30" ["price"]=> string(9) "26.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "26.990000" ["minimal_price"]=> string(9) "26.990000" ["min_price"]=> string(9) "26.990000" ["max_price"]=> string(9) "26.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(27) "Cloud Forensics Demystified" ["image_label"]=> string(27) "Cloud Forensics Demystified" ["url_key"]=> string(27) "cloud-forensics-demystified" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approachesKey FeaturesUncover the steps involved in cloud forensic investigations for M365 and Google WorkspaceE" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(32) "cloud-forensics-demystified.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Enhance your skills as a cloud investigator to adeptly respond...

    Rating:
    0%
    £26.99
    Add to Wish List
  12. Best Damn Firewall Book Period object(Magento\Catalog\Model\Product\Interceptor)#18131 (33) { ["entity_id"]=> string(5) "55080" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476063" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:40:17" ["updated_at"]=> string(19) "2025-07-24 08:40:17" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(30) "Best Damn Firewall Book Period" ["image"]=> string(22) "/9/7/9780080476063.jpg" ["small_image"]=> string(22) "/9/7/9780080476063.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476063.jpg" ["image_label"]=> string(30) "Best Damn Firewall Book Period" ["small_image_label"]=> string(30) "Best Damn Firewall Book Period" ["thumbnail_label"]=> string(30) "Best Damn Firewall Book Period" ["url_key"]=> string(30) "best-damn-firewall-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall produ" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "best-damn-firewall-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is essential reading for anyone wanting to protect...

    Rating:
    0%
    £37.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. Building DMZs For Enterprise Networks object(Magento\Catalog\Model\Product\Interceptor)#18130 (33) { ["entity_id"]=> string(5) "55162" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476261" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:47" ["updated_at"]=> string(19) "2025-07-24 08:41:47" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(37) "Building DMZs For Enterprise Networks" ["image"]=> string(22) "/9/7/9780080476261.jpg" ["small_image"]=> string(22) "/9/7/9780080476261.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476261.jpg" ["image_label"]=> string(37) "Building DMZs For Enterprise Networks" ["small_image_label"]=> string(37) "Building DMZs For Enterprise Networks" ["thumbnail_label"]=> string(37) "Building DMZs For Enterprise Networks" ["url_key"]=> string(37) "building-dmzs-for-enterprise-networks" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal n" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "building-dmzs-for-enterprise-networks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book covers what an administrator needs to plan out...

    Rating:
    0%
    £37.99
    Add to Wish List
  15. Checkpoint Next Generation Security Administration object(Magento\Catalog\Model\Product\Interceptor)#18129 (33) { ["entity_id"]=> string(5) "55220" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476452" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:40" ["updated_at"]=> string(19) "2025-07-24 08:42:40" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(50) "Checkpoint Next Generation Security Administration" ["image"]=> string(22) "/9/7/9780080476452.jpg" ["small_image"]=> string(22) "/9/7/9780080476452.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476452.jpg" ["image_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["small_image_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["thumbnail_label"]=> string(50) "Checkpoint Next Generation Security Administration" ["url_key"]=> string(50) "checkpoint-next-generation-security-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enabl" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "checkpoint-next-generation-security-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Unparalleled security management that IT professionals have been waiting for.Check...

    Rating:
    0%
    £36.99
    Add to Wish List
  16. CheckPoint NG VPN 1/Firewall 1 object(Magento\Catalog\Model\Product\Interceptor)#18128 (33) { ["entity_id"]=> string(5) "55164" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476469" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:49" ["updated_at"]=> string(19) "2025-07-24 08:41:49" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["image"]=> string(22) "/9/7/9780080476469.jpg" ["small_image"]=> string(22) "/9/7/9780080476469.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476469.jpg" ["image_label"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["small_image_label"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["thumbnail_label"]=> string(30) "CheckPoint NG VPN 1/Firewall 1" ["url_key"]=> string(30) "checkpoint-ng-vpn-1-firewall-1" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announce" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "checkpoint-ng-vpn-1-firewall-1.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Check Point Software Technologies is the worldwide leader in securing...

    Rating:
    0%
    £37.99
    Add to Wish List
  17. Designing A Wireless Network object(Magento\Catalog\Model\Product\Interceptor)#18127 (33) { ["entity_id"]=> string(5) "55373" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477169" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:41" ["updated_at"]=> string(19) "2025-07-24 08:55:41" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(28) "Designing A Wireless Network" ["image"]=> string(22) "/9/7/9780080477169.jpg" ["small_image"]=> string(22) "/9/7/9780080477169.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477169.jpg" ["image_label"]=> string(28) "Designing A Wireless Network" ["small_image_label"]=> string(28) "Designing A Wireless Network" ["thumbnail_label"]=> string(28) "Designing A Wireless Network" ["url_key"]=> string(28) "designing-a-wireless-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Business is on the move - mobile computing must keep up!Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wir" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "designing-a-wireless-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Business is on the move - mobile computing must keep...

    Rating:
    0%
    £30.99
    Add to Wish List
  18. Dr Tom Shinder's ISA Server and Beyond object(Magento\Catalog\Model\Product\Interceptor)#18126 (33) { ["entity_id"]=> string(5) "55431" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477398" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:56:50" ["updated_at"]=> string(19) "2025-07-24 08:56:50" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["image"]=> string(22) "/9/7/9780080477398.jpg" ["small_image"]=> string(22) "/9/7/9780080477398.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477398.jpg" ["image_label"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["small_image_label"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["thumbnail_label"]=> string(38) "Dr Tom Shinder's ISA Server and Beyond" ["url_key"]=> string(38) "dr-tom-shinder-s-isa-server-and-beyond" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "dr-tom-shinder-s-isa-server-and-beyond.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The terrorist attacks of September 11 signaled the dawn of...

    Rating:
    0%
    £39.99
    Add to Wish List
  19. E-Mail Virus Protection Handbook object(Magento\Catalog\Model\Product\Interceptor)#18125 (33) { ["entity_id"]=> string(5) "55445" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477534" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:57:09" ["updated_at"]=> string(19) "2025-07-24 08:57:09" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(32) "E-Mail Virus Protection Handbook" ["image"]=> string(22) "/9/7/9780080477534.jpg" ["small_image"]=> string(22) "/9/7/9780080477534.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477534.jpg" ["image_label"]=> string(32) "E-Mail Virus Protection Handbook" ["small_image_label"]=> string(32) "E-Mail Virus Protection Handbook" ["thumbnail_label"]=> string(32) "E-Mail Virus Protection Handbook" ["url_key"]=> string(32) "e-mail-virus-protection-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "e-mail-virus-protection-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The E-mail Virus Protection Handbook is organised around specific e-mail...

    Rating:
    0%
    £25.99
    Add to Wish List
  20. Ethereal Packet Sniffing object(Magento\Catalog\Model\Product\Interceptor)#18124 (33) { ["entity_id"]=> string(5) "55479" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477664" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:57:43" ["updated_at"]=> string(19) "2025-07-24 08:57:43" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(24) "Ethereal Packet Sniffing" ["image"]=> string(22) "/9/7/9780080477664.jpg" ["small_image"]=> string(22) "/9/7/9780080477664.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477664.jpg" ["image_label"]=> string(24) "Ethereal Packet Sniffing" ["small_image_label"]=> string(24) "Ethereal Packet Sniffing" ["thumbnail_label"]=> string(24) "Ethereal Packet Sniffing" ["url_key"]=> string(24) "ethereal-packet-sniffing" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal, so this book will begin with chapters coverin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(29) "ethereal-packet-sniffing.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book provides system administrators with all of the information...

    Rating:
    0%
    £31.99
    Add to Wish List
  21. Hack Proofing Your E-commerce Web Site object(Magento\Catalog\Model\Product\Interceptor)#18123 (33) { ["entity_id"]=> string(5) "55523" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478104" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:33" ["updated_at"]=> string(19) "2025-07-24 08:58:33" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(19) ["name"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["image"]=> string(22) "/9/7/9780080478104.jpg" ["small_image"]=> string(22) "/9/7/9780080478104.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478104.jpg" ["image_label"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["small_image_label"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["thumbnail_label"]=> string(38) "Hack Proofing Your E-commerce Web Site" ["url_key"]=> string(38) "hack-proofing-your-e-commerce-web-site" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the authors of the bestselling Hack Proofing Your Network!Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and ma" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "hack-proofing-your-e-commerce-web-site.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the authors of the bestselling Hack Proofing Your Network!Yahoo!,...

    Rating:
    0%
    £31.99
    Add to Wish List
  22. Contemporary Security Management object(Magento\Catalog\Model\Product\Interceptor)#18122 (33) { ["entity_id"]=> string(5) "55296" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476827" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:44:11" ["updated_at"]=> string(19) "2025-07-24 08:54:18" ["price"]=> string(9) "47.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "47.990000" ["minimal_price"]=> string(9) "47.990000" ["min_price"]=> string(9) "47.990000" ["max_price"]=> string(9) "47.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(20) ["name"]=> string(32) "Contemporary Security Management" ["image"]=> string(24) "/9/7/9780080476827_1.jpg" ["small_image"]=> string(24) "/9/7/9780080476827_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080476827_1.jpg" ["image_label"]=> string(32) "Contemporary Security Management" ["small_image_label"]=> string(32) "Contemporary Security Management" ["thumbnail_label"]=> string(32) "Contemporary Security Management" ["url_key"]=> string(32) "contemporary-security-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Contemporary Security Management, Second Edition, is the most comprehensive and up-to-date security management book available. The book is designed to provide the hard facts on modern practices to efficiently and effectively run a security department. I" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "contemporary-security-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Contemporary Security Management, Second Edition, is the most comprehensive and...

    Rating:
    0%
    £47.99
    Add to Wish List
  23. Designing SQL Server 2000 Databases object(Magento\Catalog\Model\Product\Interceptor)#18111 (33) { ["entity_id"]=> string(5) "55378" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080477190" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:47" ["updated_at"]=> string(19) "2025-07-24 08:55:47" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(21) ["name"]=> string(35) "Designing SQL Server 2000 Databases" ["image"]=> string(22) "/9/7/9780080477190.jpg" ["small_image"]=> string(22) "/9/7/9780080477190.jpg" ["thumbnail"]=> string(22) "/9/7/9780080477190.jpg" ["image_label"]=> string(35) "Designing SQL Server 2000 Databases" ["small_image_label"]=> string(35) "Designing SQL Server 2000 Databases" ["thumbnail_label"]=> string(35) "Designing SQL Server 2000 Databases" ["url_key"]=> string(35) "designing-sql-server-2000-databases" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities of SQL Server 2000, one of the key components of .NE" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "designing-sql-server-2000-databases.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Microsoft .NET initiative is the future of e-commerce -...

    Rating:
    0%
    £31.99
    Add to Wish List
  24. Hack Proofing Windows 2000 Server object(Magento\Catalog\Model\Product\Interceptor)#18114 (33) { ["entity_id"]=> string(5) "55539" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478142" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:51" ["updated_at"]=> string(19) "2025-07-24 08:58:51" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(22) ["name"]=> string(33) "Hack Proofing Windows 2000 Server" ["image"]=> string(22) "/9/7/9780080478142.jpg" ["small_image"]=> string(22) "/9/7/9780080478142.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478142.jpg" ["image_label"]=> string(33) "Hack Proofing Windows 2000 Server" ["small_image_label"]=> string(33) "Hack Proofing Windows 2000 Server" ["thumbnail_label"]=> string(33) "Hack Proofing Windows 2000 Server" ["url_key"]=> string(33) "hack-proofing-windows-2000-server" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The complete, authoritative guide to protecting your Windows 2000 Network"e;Essential reading for your IT security organization."e; -Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch th" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "hack-proofing-windows-2000-server.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The complete, authoritative guide to protecting your Windows 2000 Network"e;Essential...

    Rating:
    0%
    £31.99
    Add to Wish List
  25. Hack Proofing XML object(Magento\Catalog\Model\Product\Interceptor)#18120 (33) { ["entity_id"]=> string(5) "55540" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478159" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:53" ["updated_at"]=> string(19) "2025-07-24 08:58:53" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(23) ["name"]=> string(17) "Hack Proofing XML" ["image"]=> string(22) "/9/7/9780080478159.jpg" ["small_image"]=> string(22) "/9/7/9780080478159.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478159.jpg" ["image_label"]=> string(17) "Hack Proofing XML" ["small_image_label"]=> string(17) "Hack Proofing XML" ["thumbnail_label"]=> string(17) "Hack Proofing XML" ["url_key"]=> string(17) "hack-proofing-xml" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "hack-proofing-xml.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £31.99
    Add to Wish List
  26. Hack Proofing Your Web Applications object(Magento\Catalog\Model\Product\Interceptor)#18117 (33) { ["entity_id"]=> string(5) "55538" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478135" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:50" ["updated_at"]=> string(19) "2025-07-24 08:58:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(24) ["name"]=> string(35) "Hack Proofing Your Web Applications" ["image"]=> string(22) "/9/7/9780080478135.jpg" ["small_image"]=> string(22) "/9/7/9780080478135.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478135.jpg" ["image_label"]=> string(35) "Hack Proofing Your Web Applications" ["small_image_label"]=> string(35) "Hack Proofing Your Web Applications" ["thumbnail_label"]=> string(35) "Hack Proofing Your Web Applications" ["url_key"]=> string(35) "hack-proofing-your-web-applications" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the authors of the bestselling Hack Proofing Your Network!OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applicatio" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "hack-proofing-your-web-applications.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the authors of the bestselling Hack Proofing Your Network!OPEC,...

    Rating:
    0%
    £31.99
    Add to Wish List
  27. Managing and Securing a Cisco Structured Wireless-Aware Network object(Magento\Catalog\Model\Product\Interceptor)#18112 (33) { ["entity_id"]=> string(5) "55756" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479033" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:03:16" ["updated_at"]=> string(19) "2025-07-24 09:03:16" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(25) ["name"]=> string(63) "Managing and Securing a Cisco Structured Wireless-Aware Network" ["image"]=> string(22) "/9/7/9780080479033.jpg" ["small_image"]=> string(22) "/9/7/9780080479033.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479033.jpg" ["image_label"]=> string(63) "Managing and Securing a Cisco Structured Wireless-Aware Network" ["small_image_label"]=> string(63) "Managing and Securing a Cisco Structured Wireless-Aware Network" ["thumbnail_label"]=> string(63) "Managing and Securing a Cisco Structured Wireless-Aware Network" ["url_key"]=> string(63) "managing-and-securing-a-cisco-structured-wireless-aware-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(68) "managing-and-securing-a-cisco-structured-wireless-aware-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Managing and Securing a Cisco Structured Wireless-Aware Network is essential...

    Rating:
    0%
    £37.99
    Add to Wish List
  28. MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298) object(Magento\Catalog\Model\Product\Interceptor)#18121 (33) { ["entity_id"]=> string(5) "55787" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479279" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:03:50" ["updated_at"]=> string(19) "2025-07-24 09:03:50" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(26) ["name"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["image"]=> string(22) "/9/7/9780080479279.jpg" ["small_image"]=> string(22) "/9/7/9780080479279.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479279.jpg" ["image_label"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["small_image_label"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["thumbnail_label"]=> string(71) "MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)" ["url_key"]=> string(69) "mcse-designing-security-for-a-windows-server-2003-network-exam-70-298" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "MCSE Designing Security for a Microsoft Windows Server 2003 Network (Exam 70-298) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system g" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(74) "mcse-designing-security-for-a-windows-server-2003-network-exam-70-298.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    MCSE Designing Security for a Microsoft Windows Server 2003 Network...

    Rating:
    0%
    £39.99
    Add to Wish List
  29. Physical Security Systems Handbook object(Magento\Catalog\Model\Product\Interceptor)#18098 (33) { ["entity_id"]=> string(5) "55992" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480008" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:07:58" ["updated_at"]=> string(19) "2025-07-24 09:07:58" ["price"]=> string(9) "40.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "40.990000" ["minimal_price"]=> string(9) "40.990000" ["min_price"]=> string(9) "40.990000" ["max_price"]=> string(9) "40.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(27) ["name"]=> string(34) "Physical Security Systems Handbook" ["image"]=> string(22) "/9/7/9780080480008.jpg" ["small_image"]=> string(22) "/9/7/9780080480008.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480008.jpg" ["image_label"]=> string(34) "Physical Security Systems Handbook" ["small_image_label"]=> string(34) "Physical Security Systems Handbook" ["thumbnail_label"]=> string(34) "Physical Security Systems Handbook" ["url_key"]=> string(34) "physical-security-systems-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed sur" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "physical-security-systems-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A practical reference written to assist the security professional in...

    Rating:
    0%
    £40.99
    Add to Wish List
  30. Special Ops: Host and Network Security for Microsoft Unix and Oracle object(Magento\Catalog\Model\Product\Interceptor)#18119 (33) { ["entity_id"]=> string(5) "56182" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481050" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:30" ["updated_at"]=> string(19) "2025-07-24 09:11:30" ["price"]=> string(9) "43.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "43.990000" ["minimal_price"]=> string(9) "43.990000" ["min_price"]=> string(9) "43.990000" ["max_price"]=> string(9) "43.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(28) ["name"]=> string(68) "Special Ops: Host and Network Security for Microsoft Unix and Oracle" ["image"]=> string(22) "/9/7/9780080481050.jpg" ["small_image"]=> string(22) "/9/7/9780080481050.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481050.jpg" ["image_label"]=> string(68) "Special Ops: Host and Network Security for Microsoft Unix and Oracle" ["small_image_label"]=> string(68) "Special Ops: Host and Network Security for Microsoft Unix and Oracle" ["thumbnail_label"]=> string(68) "Special Ops: Host and Network Security for Microsoft Unix and Oracle" ["url_key"]=> string(67) "special-ops-host-and-network-security-for-microsoft-unix-and-oracle" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "e;bad guys,"e; but what has been done on the inside? This book attacks t" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(72) "special-ops-host-and-network-security-for-microsoft-unix-and-oracle.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Special Ops: Internal Network Security Guide is the solution for...

    Rating:
    0%
    £43.99
    Add to Wish List
  31. Configuring VMware ESX Server 2.5 object(Magento\Catalog\Model\Product\Interceptor)#18543 (33) { ["entity_id"]=> string(5) "56668" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488578" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:20:29" ["updated_at"]=> string(19) "2025-07-24 09:20:29" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(29) ["name"]=> string(33) "Configuring VMware ESX Server 2.5" ["image"]=> string(22) "/9/7/9780080488578.jpg" ["small_image"]=> string(22) "/9/7/9780080488578.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488578.jpg" ["image_label"]=> string(33) "Configuring VMware ESX Server 2.5" ["small_image_label"]=> string(33) "Configuring VMware ESX Server 2.5" ["thumbnail_label"]=> string(33) "Configuring VMware ESX Server 2.5" ["url_key"]=> string(32) "configuring-vmware-esx-server-25" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(37) "configuring-vmware-esx-server-25.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book will detail the default and custom installation of...

    Rating:
    0%
    £31.99
    Add to Wish List
  32. Nessus, Snort, and Ethereal Power Tools object(Magento\Catalog\Model\Product\Interceptor)#18544 (33) { ["entity_id"]=> string(5) "56882" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489421" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:30" ["updated_at"]=> string(19) "2025-07-24 09:24:30" ["price"]=> string(9) "26.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "26.990000" ["minimal_price"]=> string(9) "26.990000" ["min_price"]=> string(9) "26.990000" ["max_price"]=> string(9) "26.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(30) ["name"]=> string(39) "Nessus, Snort, and Ethereal Power Tools" ["image"]=> string(22) "/9/7/9780080489421.jpg" ["small_image"]=> string(22) "/9/7/9780080489421.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489421.jpg" ["image_label"]=> string(39) "Nessus, Snort, and Ethereal Power Tools" ["small_image_label"]=> string(39) "Nessus, Snort, and Ethereal Power Tools" ["thumbnail_label"]=> string(39) "Nessus, Snort, and Ethereal Power Tools" ["url_key"]=> string(37) "nessus-snort-and-ethereal-power-tools" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contain" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "nessus-snort-and-ethereal-power-tools.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Nessus, Snort, and Ethereal Power Tools covers customizing Snort to...

    Rating:
    0%
    £26.99
    Add to Wish List
  33. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals object(Magento\Catalog\Model\Product\Interceptor)#18546 (33) { ["entity_id"]=> string(5) "56898" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489728" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:51" ["updated_at"]=> string(19) "2025-07-24 09:24:51" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(31) ["name"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["image"]=> string(22) "/9/7/9780080489728.jpg" ["small_image"]=> string(22) "/9/7/9780080489728.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489728.jpg" ["image_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["small_image_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["thumbnail_label"]=> string(112) "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals" ["url_key"]=> string(108) "sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyo" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(113) "sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The book is logically divided into 5 main categories with...

    Rating:
    0%
    £31.99
    Add to Wish List
  34. Penetration Tester's Open Source Toolkit object(Magento\Catalog\Model\Product\Interceptor)#18550 (33) { ["entity_id"]=> string(5) "56935" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489520" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:25:35" ["updated_at"]=> string(19) "2025-07-24 09:25:35" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(32) ["name"]=> string(40) "Penetration Tester's Open Source Toolkit" ["image"]=> string(22) "/9/7/9780080489520.jpg" ["small_image"]=> string(22) "/9/7/9780080489520.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489520.jpg" ["image_label"]=> string(40) "Penetration Tester's Open Source Toolkit" ["small_image_label"]=> string(40) "Penetration Tester's Open Source Toolkit" ["thumbnail_label"]=> string(40) "Penetration Tester's Open Source Toolkit" ["url_key"]=> string(40) "penetration-tester-s-open-source-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hund" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "penetration-tester-s-open-source-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Penetration testing a network requires a delicate balance of art...

    Rating:
    0%
    £37.99
    Add to Wish List
  35. Classical and Modern Cryptography for Beginners object(Magento\Catalog\Model\Product\Interceptor)#18549 (27) { ["entity_id"]=> string(5) "57112" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031329593" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:28:54" ["updated_at"]=> string(19) "2025-07-24 09:28:54" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(33) ["name"]=> string(47) "Classical and Modern Cryptography for Beginners" ["image_label"]=> string(47) "Classical and Modern Cryptography for Beginners" ["url_key"]=> string(47) "classical-and-modern-cryptography-for-beginners" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.  It also provides the information on the cryptography and a cryptosystem used by " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(52) "classical-and-modern-cryptography-for-beginners.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This textbook offers the knowledge and the mathematical background or...

    Rating:
    0%
    £54.99
    Add to Wish List
  36. Quiet Crypto Revolution object(Magento\Catalog\Model\Product\Interceptor)#18551 (27) { ["entity_id"]=> string(5) "58651" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484296271" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:55:57" ["updated_at"]=> string(19) "2025-07-24 11:55:57" ["price"]=> string(9) "19.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "19.990000" ["minimal_price"]=> string(9) "19.990000" ["min_price"]=> string(9) "19.990000" ["max_price"]=> string(9) "19.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(34) ["name"]=> string(23) "Quiet Crypto Revolution" ["image_label"]=> string(23) "Quiet Crypto Revolution" ["url_key"]=> string(23) "quiet-crypto-revolution" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Crypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible languag" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "quiet-crypto-revolution.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Crypto is going to change the world, and for those...

    Rating:
    0%
    £19.99
    Add to Wish List
  37. Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide object(Magento\Catalog\Model\Product\Interceptor)#18552 (27) { ["entity_id"]=> string(5) "58665" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781800566552" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:56:09" ["updated_at"]=> string(19) "2025-07-24 11:56:09" ["price"]=> string(8) "0.010000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(8) "0.010000" ["minimal_price"]=> string(8) "0.010000" ["min_price"]=> string(8) "0.010000" ["max_price"]=> string(8) "0.010000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(35) ["name"]=> string(79) "Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide" ["image_label"]=> string(79) "Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide" ["url_key"]=> string(79) "official-google-cloud-certified-professional-cloud-security-engineer-exam-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Master designing, developing, and operating secure infrastructures on Google cloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for bui" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(84) "official-google-cloud-certified-professional-cloud-security-engineer-exam-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Master designing, developing, and operating secure infrastructures on Google cloudKey...

    Rating:
    0%
    £0.01
    Add to Wish List
  38. Lecture Notes in Computer Science object(Magento\Catalog\Model\Product\Interceptor)#18553 (30) { ["entity_id"]=> string(5) "48450" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783030127862" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 13:04:02" ["updated_at"]=> string(19) "2025-07-24 11:48:53" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(36) ["name"]=> string(33) "Lecture Notes in Computer Science" ["image"]=> string(18) "/9783030127862.jpg" ["small_image"]=> string(18) "/9783030127862.jpg" ["thumbnail"]=> string(18) "/9783030127862.jpg" ["image_label"]=> string(33) "Lecture Notes in Computer Science" ["url_key"]=> string(33) "lecture-notes-in-computer-science" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Pri" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "lecture-notes-in-computer-science.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book constitutes the thoroughly refereed post-conference proceedings of the...

    Rating:
    0%
    £44.99
    Add to Wish List
  39. Cybersecurity Operations Handbook object(Magento\Catalog\Model\Product\Interceptor)#18554 (33) { ["entity_id"]=> string(5) "62745" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080530185" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 13:25:38" ["updated_at"]=> string(19) "2025-07-24 13:25:38" ["price"]=> string(9) "88.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "88.000000" ["minimal_price"]=> string(9) "88.000000" ["min_price"]=> string(9) "88.000000" ["max_price"]=> string(9) "88.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(37) ["name"]=> string(33) "Cybersecurity Operations Handbook" ["image"]=> string(22) "/9/7/9780080530185.jpg" ["small_image"]=> string(22) "/9/7/9780080530185.jpg" ["thumbnail"]=> string(22) "/9/7/9780080530185.jpg" ["image_label"]=> string(33) "Cybersecurity Operations Handbook" ["small_image_label"]=> string(33) "Cybersecurity Operations Handbook" ["thumbnail_label"]=> string(33) "Cybersecurity Operations Handbook" ["url_key"]=> string(33) "cybersecurity-operations-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "cybersecurity-operations-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Cybersecurity Operations Handbook is the first book for daily operations...

    Rating:
    0%
    £88.00
    Add to Wish List
  40. Scripting VMware Power Tools: Automating Virtual Infrastructure Administration object(Magento\Catalog\Model\Product\Interceptor)#18555 (33) { ["entity_id"]=> string(5) "60210" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080516776" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:27:36" ["updated_at"]=> string(19) "2025-07-24 12:27:36" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(38) ["name"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["image"]=> string(22) "/9/7/9780080516776.jpg" ["small_image"]=> string(22) "/9/7/9780080516776.jpg" ["thumbnail"]=> string(22) "/9/7/9780080516776.jpg" ["image_label"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["small_image_label"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["thumbnail_label"]=> string(78) "Scripting VMware Power Tools: Automating Virtual Infrastructure Administration" ["url_key"]=> string(77) "scripting-vmware-power-tools-automating-virtual-infrastructure-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then dis" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(82) "scripting-vmware-power-tools-automating-virtual-infrastructure-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book contains simple and advanced scripting using both ESX...

    Rating:
    0%
    £31.99
    Add to Wish List
  41. RFID+ Study Guide and Practice Exams object(Magento\Catalog\Model\Product\Interceptor)#18556 (33) { ["entity_id"]=> string(5) "60272" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080516295" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:29:00" ["updated_at"]=> string(19) "2025-07-24 12:29:00" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(39) ["name"]=> string(36) "RFID+ Study Guide and Practice Exams" ["image"]=> string(22) "/9/7/9780080516295.jpg" ["small_image"]=> string(22) "/9/7/9780080516295.jpg" ["thumbnail"]=> string(22) "/9/7/9780080516295.jpg" ["image_label"]=> string(36) "RFID+ Study Guide and Practice Exams" ["small_image_label"]=> string(36) "RFID+ Study Guide and Practice Exams" ["thumbnail_label"]=> string(36) "RFID+ Study Guide and Practice Exams" ["url_key"]=> string(35) "rfid-study-guide-and-practice-exams" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a guide to CompTIA's new RFID+ Security exam and includes " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "rfid-study-guide-and-practice-exams.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Radio Frequency Identification (RFID) is an automatic identification method, relying...

    Rating:
    0%
    £25.99
    Add to Wish List
  42. IP Addressing and Subnetting INC IPV6 object(Magento\Catalog\Model\Product\Interceptor)#18558 (33) { ["entity_id"]=> string(5) "64237" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080535227" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 13:58:08" ["updated_at"]=> string(19) "2025-07-24 13:58:08" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(41) ["name"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["image"]=> string(22) "/9/7/9780080535227.jpg" ["small_image"]=> string(22) "/9/7/9780080535227.jpg" ["thumbnail"]=> string(22) "/9/7/9780080535227.jpg" ["image_label"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["small_image_label"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["thumbnail_label"]=> string(37) "IP Addressing and Subnetting INC IPV6" ["url_key"]=> string(37) "ip-addressing-and-subnetting-inc-ipv6" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. They allow for the precise routing of data across very complex worldwide internetworks. The rules for their format and use are g" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "ip-addressing-and-subnetting-inc-ipv6.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Internetworking Protocol (IP) addresses are the unique numeric identifiers required...

    Rating:
    0%
    £38.99
    Add to Wish List
  43. Best Damn Cybercrime and Digital Forensics Book Period object(Magento\Catalog\Model\Product\Interceptor)#18559 (33) { ["entity_id"]=> string(5) "67327" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556086" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:05:44" ["updated_at"]=> string(19) "2025-07-24 15:05:44" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(42) ["name"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["image"]=> string(22) "/9/7/9780080556086.jpg" ["small_image"]=> string(22) "/9/7/9780080556086.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556086.jpg" ["image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["small_image_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["thumbnail_label"]=> string(54) "Best Damn Cybercrime and Digital Forensics Book Period" ["url_key"]=> string(54) "best-damn-cybercrime-and-digital-forensics-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "best-damn-cybercrime-and-digital-forensics-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Electronic discovery refers to a process in which electronic data...

    Rating:
    0%
    £36.99
    Add to Wish List
  44. Best Damn IT Security Management Book Period object(Magento\Catalog\Model\Product\Interceptor)#18560 (33) { ["entity_id"]=> string(5) "67407" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080557335" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:07:34" ["updated_at"]=> string(19) "2025-07-24 15:07:34" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(43) ["name"]=> string(44) "Best Damn IT Security Management Book Period" ["image"]=> string(22) "/9/7/9780080557335.jpg" ["small_image"]=> string(22) "/9/7/9780080557335.jpg" ["thumbnail"]=> string(22) "/9/7/9780080557335.jpg" ["image_label"]=> string(44) "Best Damn IT Security Management Book Period" ["small_image_label"]=> string(44) "Best Damn IT Security Management Book Period" ["thumbnail_label"]=> string(44) "Best Damn IT Security Management Book Period" ["url_key"]=> string(44) "best-damn-it-security-management-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issue" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "best-damn-it-security-management-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The security field evolves rapidly becoming broader and more complex...

    Rating:
    0%
    £38.99
    Add to Wish List
  45. No Tech Hacking object(Magento\Catalog\Model\Product\Interceptor)#18561 (33) { ["entity_id"]=> string(5) "67723" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558752" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:14:42" ["updated_at"]=> string(19) "2025-07-24 15:14:42" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(44) ["name"]=> string(15) "No Tech Hacking" ["image"]=> string(22) "/9/7/9780080558752.jpg" ["small_image"]=> string(22) "/9/7/9780080558752.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558752.jpg" ["image_label"]=> string(15) "No Tech Hacking" ["small_image_label"]=> string(15) "No Tech Hacking" ["thumbnail_label"]=> string(15) "No Tech Hacking" ["url_key"]=> string(15) "no-tech-hacking" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliche goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronical" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(20) "no-tech-hacking.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's...

    Rating:
    0%
    £30.99
    Add to Wish List
  46. TechnoSecurity's Guide to E-Discovery and Digital Forensics object(Magento\Catalog\Model\Product\Interceptor)#18562 (33) { ["entity_id"]=> string(5) "67781" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558813" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:23" ["updated_at"]=> string(19) "2025-07-24 15:16:23" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(45) ["name"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["image"]=> string(22) "/9/7/9780080558813.jpg" ["small_image"]=> string(22) "/9/7/9780080558813.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558813.jpg" ["image_label"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["small_image_label"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["thumbnail_label"]=> string(59) "TechnoSecurity's Guide to E-Discovery and Digital Forensics" ["url_key"]=> string(59) "technosecurity-s-guide-to-e-discovery-and-digital-forensics" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(64) "technosecurity-s-guide-to-e-discovery-and-digital-forensics.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security...

    Rating:
    0%
    £38.99
    Add to Wish List
  47. Viruses Revealed object(Magento\Catalog\Model\Product\Interceptor)#18563 (33) { ["entity_id"]=> string(5) "49655" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228182" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:40:50" ["updated_at"]=> string(19) "2025-07-24 06:49:52" ["price"]=> string(9) "36.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.000000" ["minimal_price"]=> string(9) "36.000000" ["min_price"]=> string(9) "36.000000" ["max_price"]=> string(9) "36.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(46) ["name"]=> string(16) "Viruses Revealed" ["image"]=> string(24) "/9/7/9780072228182_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228182_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228182_1.jpg" ["image_label"]=> string(16) "Viruses Revealed" ["small_image_label"]=> string(16) "Viruses Revealed" ["thumbnail_label"]=> string(16) "Viruses Revealed" ["url_key"]=> string(16) "viruses-revealed" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Defend your system against the real threat of computer viruses with" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "viruses-revealed.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Publisher's Note: Products purchased from Third Party sellers are not...

    Rating:
    0%
    £36.00
    Add to Wish List
  48. Hacking Exposed object(Magento\Catalog\Model\Product\Interceptor)#18564 (33) { ["entity_id"]=> string(5) "49519" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072192148" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:40" ["updated_at"]=> string(19) "2025-07-24 06:46:43" ["price"]=> string(9) "39.600000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.600000" ["minimal_price"]=> string(9) "39.600000" ["min_price"]=> string(9) "39.600000" ["max_price"]=> string(9) "39.600000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(47) ["name"]=> string(15) "Hacking Exposed" ["image"]=> string(24) "/9/7/9780072192148_1.jpg" ["small_image"]=> string(24) "/9/7/9780072192148_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072192148_1.jpg" ["image_label"]=> string(15) "Hacking Exposed" ["small_image_label"]=> string(15) "Hacking Exposed" ["thumbnail_label"]=> string(15) "Hacking Exposed" ["url_key"]=> string(15) "hacking-exposed" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(125) "This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(20) "hacking-exposed.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This one-of-a-kind book provides in-depth expert insight into how hackers...

    Rating:
    0%
    £39.60
    Add to Wish List
  49. PKI: Implementing & Managing E-Security object(Magento\Catalog\Model\Product\Interceptor)#18565 (33) { ["entity_id"]=> string(5) "49524" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072192261" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:37:47" ["updated_at"]=> string(19) "2025-07-24 06:46:52" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(48) ["name"]=> string(39) "PKI: Implementing & Managing E-Security" ["image"]=> string(24) "/9/7/9780072192261_1.jpg" ["small_image"]=> string(24) "/9/7/9780072192261_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072192261_1.jpg" ["image_label"]=> string(39) "PKI: Implementing & Managing E-Security" ["small_image_label"]=> string(39) "PKI: Implementing & Managing E-Security" ["thumbnail_label"]=> string(39) "PKI: Implementing & Managing E-Security" ["url_key"]=> string(36) "pki-implementing-managing-e-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(196) "Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(41) "pki-implementing-managing-e-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by the experts at RSA Security, this book will...

    Rating:
    0%
    £54.90
    Add to Wish List
  50. Privacy Symposium 2022 object(Magento\Catalog\Model\Product\Interceptor)#18566 (27) { ["entity_id"]=> string(5) "51119" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031099014" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 19:08:14" ["updated_at"]=> string(19) "2025-07-24 07:17:18" ["price"]=> string(10) "179.500000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "179.500000" ["minimal_price"]=> string(10) "179.500000" ["min_price"]=> string(10) "179.500000" ["max_price"]=> string(10) "179.500000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(49) ["name"]=> string(22) "Privacy Symposium 2022" ["image_label"]=> string(22) "Privacy Symposium 2022" ["url_key"]=> string(22) "privacy-symposium-2022" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(27) "privacy-symposium-2022.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book presents a collection of high-quality research works and...

    Rating:
    0%
    £179.50
    Add to Wish List
  51. Check Point Next Generation with Application Intelligence Security Administration object(Magento\Catalog\Model\Product\Interceptor)#18567 (33) { ["entity_id"]=> string(5) "55219" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476445" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:39" ["updated_at"]=> string(19) "2025-07-24 08:42:39" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(50) ["name"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["image"]=> string(22) "/9/7/9780080476445.jpg" ["small_image"]=> string(22) "/9/7/9780080476445.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476445.jpg" ["image_label"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["small_image_label"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["thumbnail_label"]=> string(81) "Check Point Next Generation with Application Intelligence Security Administration" ["url_key"]=> string(81) "check-point-next-generation-with-application-intelligence-security-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Check Point Next Generation with Application Intelligence Security Administration focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(86) "check-point-next-generation-with-application-intelligence-security-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Check Point Next Generation with Application Intelligence Security Administration focuses...

    Rating:
    0%
    £38.99
    Add to Wish List
  52. Cisco AVVID and IP Telephony Design and Implementation object(Magento\Catalog\Model\Product\Interceptor)#18568 (33) { ["entity_id"]=> string(5) "55231" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476537" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:52" ["updated_at"]=> string(19) "2025-07-24 08:42:52" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(51) ["name"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["image"]=> string(22) "/9/7/9780080476537.jpg" ["small_image"]=> string(22) "/9/7/9780080476537.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476537.jpg" ["image_label"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["small_image_label"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["thumbnail_label"]=> string(54) "Cisco AVVID and IP Telephony Design and Implementation" ["url_key"]=> string(54) "cisco-avvid-and-ip-telephony-design-and-implementation" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Corporate demand for AVVID solutions is rapidly increasing - engineers will need this bookCisco AVVID (Architecture for Voice, Video and Integrated Data), the latest development from Cisco Systems, is redefining the way businesses communicate. AVVID allow" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(59) "cisco-avvid-and-ip-telephony-design-and-implementation.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Corporate demand for AVVID solutions is rapidly increasing - engineers...

    Rating:
    0%
    £44.99
    Add to Wish List
  53. Best Damn Cisco Internetworking Book Period object(Magento\Catalog\Model\Product\Interceptor)#18569 (33) { ["entity_id"]=> string(5) "55079" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476056" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:40:16" ["updated_at"]=> string(19) "2025-07-24 08:40:16" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(52) ["name"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["image"]=> string(22) "/9/7/9780080476056.jpg" ["small_image"]=> string(22) "/9/7/9780080476056.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476056.jpg" ["image_label"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["small_image_label"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["thumbnail_label"]=> string(43) "Best Damn Cisco Internetworking Book Period" ["url_key"]=> string(43) "best-damn-cisco-internetworking-book-period" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Best Damn Cisco Internetworking Book Period shows readers everything they need to know about all Cisco internetworking topics. The book provides an understanding of Cisco's current VoIP solutions and the means to put them to work, showing how to confi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "best-damn-cisco-internetworking-book-period.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Best Damn Cisco Internetworking Book Period shows readers everything...

    Rating:
    0%
    £39.99
    Add to Wish List
  54. Bluetooth Application Developer's Guide object(Magento\Catalog\Model\Product\Interceptor)#18570 (33) { ["entity_id"]=> string(5) "55131" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476179" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:41:16" ["updated_at"]=> string(19) "2025-07-24 08:41:16" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(53) ["name"]=> string(39) "Bluetooth Application Developer's Guide" ["image"]=> string(22) "/9/7/9780080476179.jpg" ["small_image"]=> string(22) "/9/7/9780080476179.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476179.jpg" ["image_label"]=> string(39) "Bluetooth Application Developer's Guide" ["small_image_label"]=> string(39) "Bluetooth Application Developer's Guide" ["thumbnail_label"]=> string(39) "Bluetooth Application Developer's Guide" ["url_key"]=> string(39) "bluetooth-application-developer-s-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;Bluetooth (enabled devices) will ship in the billions of units once it gains momentum."e; - Martin Reynolds, Gartner GroupBluetooth is the most exciting development in wireless computing this decade! Bluetooth enabled devices can include everyt" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(44) "bluetooth-application-developer-s-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;Bluetooth (enabled devices) will ship in the billions of units...

    Rating:
    0%
    £31.99
    Add to Wish List
  55. Securing HP NonStop Servers in an Open Systems World object(Magento\Catalog\Model\Product\Interceptor)#18571 (33) { ["entity_id"]=> string(5) "54994" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080475578" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:38:37" ["updated_at"]=> string(19) "2025-07-24 08:38:37" ["price"]=> string(9) "80.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "80.000000" ["minimal_price"]=> string(9) "80.000000" ["min_price"]=> string(9) "80.000000" ["max_price"]=> string(9) "80.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(54) ["name"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["image"]=> string(22) "/9/7/9780080475578.jpg" ["small_image"]=> string(22) "/9/7/9780080475578.jpg" ["thumbnail"]=> string(22) "/9/7/9780080475578.jpg" ["image_label"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["small_image_label"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["thumbnail_label"]=> string(52) "Securing HP NonStop Servers in an Open Systems World" ["url_key"]=> string(52) "securing-hp-nonstop-servers-in-an-open-systems-world" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(57) "securing-hp-nonstop-servers-in-an-open-systems-world.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Recent corporate events have exposed the frequency and consequences of...

    Rating:
    0%
    £80.00
    Add to Wish List
  56. Hack Proofing Your Identity In The Information Age object(Magento\Catalog\Model\Product\Interceptor)#18572 (33) { ["entity_id"]=> string(5) "55513" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478081" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:20" ["updated_at"]=> string(19) "2025-07-24 08:58:20" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(55) ["name"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["image"]=> string(22) "/9/7/9780080478081.jpg" ["small_image"]=> string(22) "/9/7/9780080478081.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478081.jpg" ["image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["small_image_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["thumbnail_label"]=> string(50) "Hack Proofing Your Identity In The Information Age" ["url_key"]=> string(50) "hack-proofing-your-identity-in-the-information-age" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-o" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(55) "hack-proofing-your-identity-in-the-information-age.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Identity-theft is the fastest growing crime in America, affecting approximately...

    Rating:
    0%
    £25.99
    Add to Wish List
  57. Hackproofing Your Wireless Network object(Magento\Catalog\Model\Product\Interceptor)#18573 (33) { ["entity_id"]=> string(5) "55550" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478180" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:59:09" ["updated_at"]=> string(19) "2025-07-24 08:59:09" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(56) ["name"]=> string(34) "Hackproofing Your Wireless Network" ["image"]=> string(22) "/9/7/9780080478180.jpg" ["small_image"]=> string(22) "/9/7/9780080478180.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478180.jpg" ["image_label"]=> string(34) "Hackproofing Your Wireless Network" ["small_image_label"]=> string(34) "Hackproofing Your Wireless Network" ["thumbnail_label"]=> string(34) "Hackproofing Your Wireless Network" ["url_key"]=> string(34) "hackproofing-your-wireless-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair." ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "hackproofing-your-wireless-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £31.99
    Add to Wish List
  58. Configuring NetScreen Firewalls object(Magento\Catalog\Model\Product\Interceptor)#18574 (33) { ["entity_id"]=> string(5) "55294" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476780" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:44:09" ["updated_at"]=> string(19) "2025-07-24 08:54:11" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(57) ["name"]=> string(31) "Configuring NetScreen Firewalls" ["image"]=> string(24) "/9/7/9780080476780_1.jpg" ["small_image"]=> string(24) "/9/7/9780080476780_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080476780_1.jpg" ["image_label"]=> string(31) "Configuring NetScreen Firewalls" ["small_image_label"]=> string(31) "Configuring NetScreen Firewalls" ["thumbnail_label"]=> string(31) "Configuring NetScreen Firewalls" ["url_key"]=> string(31) "configuring-netscreen-firewalls" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for secu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "configuring-netscreen-firewalls.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The first book on the market covering the #2 best-selling...

    Rating:
    0%
    £31.99
    Add to Wish List
  59. CYA Securing Exchange Server 2003 object(Magento\Catalog\Model\Product\Interceptor)#18575 (33) { ["entity_id"]=> string(5) "55339" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476971" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:54:58" ["updated_at"]=> string(19) "2025-07-24 08:54:58" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(58) ["name"]=> string(33) "CYA Securing Exchange Server 2003" ["image"]=> string(22) "/9/7/9780080476971.jpg" ["small_image"]=> string(22) "/9/7/9780080476971.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476971.jpg" ["image_label"]=> string(33) "CYA Securing Exchange Server 2003" ["small_image_label"]=> string(33) "CYA Securing Exchange Server 2003" ["thumbnail_label"]=> string(33) "CYA Securing Exchange Server 2003" ["url_key"]=> string(33) "cya-securing-exchange-server-2003" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "e;MMCs"e; (Microsoft Management Consoles) that contain the configuration me" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "cya-securing-exchange-server-2003.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A highly portable, easily digestible road-map to configuring, maintaining and...

    Rating:
    0%
    £25.99
    Add to Wish List
  60. CYA Securing IIS 6.0 object(Magento\Catalog\Model\Product\Interceptor)#18576 (33) { ["entity_id"]=> string(5) "55340" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476988" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:55:00" ["updated_at"]=> string(19) "2025-07-24 08:55:00" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(59) ["name"]=> string(20) "CYA Securing IIS 6.0" ["image"]=> string(22) "/9/7/9780080476988.jpg" ["small_image"]=> string(22) "/9/7/9780080476988.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476988.jpg" ["image_label"]=> string(20) "CYA Securing IIS 6.0" ["small_image_label"]=> string(20) "CYA Securing IIS 6.0" ["thumbnail_label"]=> string(20) "CYA Securing IIS 6.0" ["url_key"]=> string(19) "cya-securing-iis-60" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "e;MMCs"e; (Microsoft Management Consoles) that contain the configuration menus for the es" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "cya-securing-iis-60.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A highly portable, easily digestible road-map to configuring, maintaining and...

    Rating:
    0%
    £25.99
    Add to Wish List
  61. Managing Cisco Network Security object(Magento\Catalog\Model\Product\Interceptor)#18577 (33) { ["entity_id"]=> string(5) "55759" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479057" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:03:20" ["updated_at"]=> string(19) "2025-07-24 09:03:20" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(60) ["name"]=> string(31) "Managing Cisco Network Security" ["image"]=> string(22) "/9/7/9780080479057.jpg" ["small_image"]=> string(22) "/9/7/9780080479057.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479057.jpg" ["image_label"]=> string(31) "Managing Cisco Network Security" ["small_image_label"]=> string(31) "Managing Cisco Network Security" ["thumbnail_label"]=> string(31) "Managing Cisco Network Security" ["url_key"]=> string(31) "managing-cisco-network-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world"e;There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."e; -Mike F" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "managing-cisco-network-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    An in-depth knowledge of how to configure Cisco IP network...

    Rating:
    0%
    £38.99
    Add to Wish List
  62. Nokia Network Security Solutions Handbook object(Magento\Catalog\Model\Product\Interceptor)#18578 (33) { ["entity_id"]=> string(5) "55919" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080479712" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:06:30" ["updated_at"]=> string(19) "2025-07-24 09:06:30" ["price"]=> string(9) "37.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "37.990000" ["minimal_price"]=> string(9) "37.990000" ["min_price"]=> string(9) "37.990000" ["max_price"]=> string(9) "37.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(61) ["name"]=> string(41) "Nokia Network Security Solutions Handbook" ["image"]=> string(22) "/9/7/9780080479712.jpg" ["small_image"]=> string(22) "/9/7/9780080479712.jpg" ["thumbnail"]=> string(22) "/9/7/9780080479712.jpg" ["image_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["small_image_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["thumbnail_label"]=> string(41) "Nokia Network Security Solutions Handbook" ["url_key"]=> string(41) "nokia-network-security-solutions-handbook" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(46) "nokia-network-security-solutions-handbook.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Nokia Network Security Solutions Handbook introduces readers to both...

    Rating:
    0%
    £37.99
    Add to Wish List
  63. Snort 2.1 Intrusion Detection, Second Edition object(Magento\Catalog\Model\Product\Interceptor)#18579 (33) { ["entity_id"]=> string(5) "56193" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480992" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:46" ["updated_at"]=> string(19) "2025-07-24 09:11:46" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(62) ["name"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["image"]=> string(22) "/9/7/9780080480992.jpg" ["small_image"]=> string(22) "/9/7/9780080480992.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480992.jpg" ["image_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["small_image_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["thumbnail_label"]=> string(45) "Snort 2.1 Intrusion Detection, Second Edition" ["url_key"]=> string(43) "snort-21-intrusion-detection-second-edition" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Called "e;the leader in the Snort IDS book arms race"e; by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "snort-21-intrusion-detection-second-edition.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Called "e;the leader in the Snort IDS book arms race"e;...

    Rating:
    0%
    £31.99
    Add to Wish List
  64. WarDriving: Drive, Detect, Defend object(Magento\Catalog\Model\Product\Interceptor)#18580 (33) { ["entity_id"]=> string(5) "56357" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080481685" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:14:37" ["updated_at"]=> string(19) "2025-07-24 09:14:37" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(63) ["name"]=> string(33) "WarDriving: Drive, Detect, Defend" ["image"]=> string(22) "/9/7/9780080481685.jpg" ["small_image"]=> string(22) "/9/7/9780080481685.jpg" ["thumbnail"]=> string(22) "/9/7/9780080481685.jpg" ["image_label"]=> string(33) "WarDriving: Drive, Detect, Defend" ["small_image_label"]=> string(33) "WarDriving: Drive, Detect, Defend" ["thumbnail_label"]=> string(33) "WarDriving: Drive, Detect, Defend" ["url_key"]=> string(30) "wardriving-drive-detect-defend" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has spa" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(35) "wardriving-drive-detect-defend.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The practice of WarDriving is a unique combination of hobby,...

    Rating:
    0%
    £31.99
    Add to Wish List
  65. How to Cheat at Managing Microsoft Operations Manager 2005 object(Magento\Catalog\Model\Product\Interceptor)#18581 (33) { ["entity_id"]=> string(5) "56651" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488462" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:20:00" ["updated_at"]=> string(19) "2025-07-24 09:20:00" ["price"]=> string(9) "24.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "24.990000" ["minimal_price"]=> string(9) "24.990000" ["min_price"]=> string(9) "24.990000" ["max_price"]=> string(9) "24.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(64) ["name"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["image"]=> string(22) "/9/7/9780080488462.jpg" ["small_image"]=> string(22) "/9/7/9780080488462.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488462.jpg" ["image_label"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["small_image_label"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["thumbnail_label"]=> string(58) "How to Cheat at Managing Microsoft Operations Manager 2005" ["url_key"]=> string(58) "how-to-cheat-at-managing-microsoft-operations-manager-2005" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administra" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(63) "how-to-cheat-at-managing-microsoft-operations-manager-2005.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Microsoft Operations Manager (MOM) is a network monitoring tool that...

    Rating:
    0%
    £24.99
    Add to Wish List
  66. Security Sage's Guide to Hardening the Network Infrastructure object(Magento\Catalog\Model\Product\Interceptor)#18582 (33) { ["entity_id"]=> string(5) "56172" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480831" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:18" ["updated_at"]=> string(19) "2025-07-24 09:11:18" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(65) ["name"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["image"]=> string(22) "/9/7/9780080480831.jpg" ["small_image"]=> string(22) "/9/7/9780080480831.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480831.jpg" ["image_label"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["small_image_label"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["thumbnail_label"]=> string(61) "Security Sage's Guide to Hardening the Network Infrastructure" ["url_key"]=> string(61) "security-sage-s-guide-to-hardening-the-network-infrastructure" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Netw" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(66) "security-sage-s-guide-to-hardening-the-network-infrastructure.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only computer book to focus completely on...

    Rating:
    0%
    £38.99
    Add to Wish List
  67. Configuring Check Point NGX VPN-1/Firewall-1 object(Magento\Catalog\Model\Product\Interceptor)#18583 (33) { ["entity_id"]=> string(5) "56667" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488561" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:20:28" ["updated_at"]=> string(19) "2025-07-24 09:20:28" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(66) ["name"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["image"]=> string(22) "/9/7/9780080488561.jpg" ["small_image"]=> string(22) "/9/7/9780080488561.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488561.jpg" ["image_label"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["small_image_label"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["thumbnail_label"]=> string(44) "Configuring Check Point NGX VPN-1/Firewall-1" ["url_key"]=> string(44) "configuring-check-point-ngx-vpn-1-firewall-1" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Lin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "configuring-check-point-ngx-vpn-1-firewall-1.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Check Point NGX VPN-1/Firewall-1 is the next major release of...

    Rating:
    0%
    £31.99
    Add to Wish List
  68. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services object(Magento\Catalog\Model\Product\Interceptor)#18584 (33) { ["entity_id"]=> string(5) "56701" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488691" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:21:09" ["updated_at"]=> string(19) "2025-07-24 09:21:09" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(67) ["name"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["image"]=> string(22) "/9/7/9780080488691.jpg" ["small_image"]=> string(22) "/9/7/9780080488691.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488691.jpg" ["image_label"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["small_image_label"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["thumbnail_label"]=> string(93) "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services" ["url_key"]=> string(92) "deploying-citrix-metaframe-presentation-server-30-with-windows-server-2003-terminal-services" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaste" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(97) "deploying-citrix-metaframe-presentation-server-30-with-windows-server-2003-terminal-services.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Almost 100% of all Fortune 500 and Fortune 1000 companies...

    Rating:
    0%
    £31.99
    Add to Wish List
  69. Phishing Exposed object(Magento\Catalog\Model\Product\Interceptor)#18585 (33) { ["entity_id"]=> string(5) "56936" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489537" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:25:36" ["updated_at"]=> string(19) "2025-07-24 09:25:36" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(68) ["name"]=> string(16) "Phishing Exposed" ["image"]=> string(22) "/9/7/9780080489537.jpg" ["small_image"]=> string(22) "/9/7/9780080489537.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489537.jpg" ["image_label"]=> string(16) "Phishing Exposed" ["small_image_label"]=> string(16) "Phishing Exposed" ["thumbnail_label"]=> string(16) "Phishing Exposed" ["url_key"]=> string(16) "phishing-exposed" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitati" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(21) "phishing-exposed.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Phishing Exposed unveils the techniques phishers employ that enable them...

    Rating:
    0%
    £31.99
    Add to Wish List
  70. Practical VoIP Security object(Magento\Catalog\Model\Product\Interceptor)#18586 (33) { ["entity_id"]=> string(5) "56937" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489551" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:25:38" ["updated_at"]=> string(19) "2025-07-24 09:25:38" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(69) ["name"]=> string(23) "Practical VoIP Security" ["image"]=> string(22) "/9/7/9780080489551.jpg" ["small_image"]=> string(22) "/9/7/9780080489551.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489551.jpg" ["image_label"]=> string(23) "Practical VoIP Security" ["small_image_label"]=> string(23) "Practical VoIP Security" ["thumbnail_label"]=> string(23) "Practical VoIP Security" ["url_key"]=> string(23) "practical-voip-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessib" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "practical-voip-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Voice Over IP (VoIP) phone lines now represent over 50%...

    Rating:
    0%
    £30.99
    Add to Wish List
  71. Sarbanes-Oxley Compliance Using COBIT and Open Source Tools object(Magento\Catalog\Model\Product\Interceptor)#18587 (33) { ["entity_id"]=> string(5) "56974" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489674" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:21" ["updated_at"]=> string(19) "2025-07-24 09:26:21" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(70) ["name"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["image"]=> string(22) "/9/7/9780080489674.jpg" ["small_image"]=> string(22) "/9/7/9780080489674.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489674.jpg" ["image_label"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["small_image_label"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["thumbnail_label"]=> string(59) "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools" ["url_key"]=> string(59) "sarbanes-oxley-compliance-using-cobit-and-open-source-tools" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(64) "sarbanes-oxley-compliance-using-cobit-and-open-source-tools.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book illustrates the many Open Source cost savings opportunities...

    Rating:
    0%
    £31.99
    Add to Wish List
  72. Securing IM and P2P Applications for the Enterprise object(Magento\Catalog\Model\Product\Interceptor)#18588 (33) { ["entity_id"]=> string(5) "56978" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489698" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:24" ["updated_at"]=> string(19) "2025-07-24 09:26:24" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(71) ["name"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["image"]=> string(22) "/9/7/9780080489698.jpg" ["small_image"]=> string(22) "/9/7/9780080489698.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489698.jpg" ["image_label"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["small_image_label"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["thumbnail_label"]=> string(51) "Securing IM and P2P Applications for the Enterprise" ["url_key"]=> string(51) "securing-im-and-p2p-applications-for-the-enterprise" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, y" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(56) "securing-im-and-p2p-applications-for-the-enterprise.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is for system administrators and security professionals who...

    Rating:
    0%
    £31.99
    Add to Wish List
Filter
Set Descending Direction

Items 1-72 of 122

Page
per page