Books

Filter
Set Descending Direction

Items 73-122 of 122

Page
per page
  1. Skype Me! From Single User to Small Enterprise and Beyond object(Magento\Catalog\Model\Product\Interceptor)#13815 (33) { ["entity_id"]=> string(5) "56979" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489711" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:26:25" ["updated_at"]=> string(19) "2025-07-24 09:26:25" ["price"]=> string(9) "22.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.990000" ["minimal_price"]=> string(9) "22.990000" ["min_price"]=> string(9) "22.990000" ["max_price"]=> string(9) "22.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(0) ["name"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["image"]=> string(22) "/9/7/9780080489711.jpg" ["small_image"]=> string(22) "/9/7/9780080489711.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489711.jpg" ["image_label"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["small_image_label"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["thumbnail_label"]=> string(57) "Skype Me! From Single User to Small Enterprise and Beyond" ["url_key"]=> string(56) "skype-me-from-single-user-to-small-enterprise-and-beyond" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn ho" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(61) "skype-me-from-single-user-to-small-enterprise-and-beyond.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book is divided into four parts. Part I begins...

    Rating:
    0%
    £22.99
    Add to Wish List
  2. Writing Security Tools and Exploits object(Magento\Catalog\Model\Product\Interceptor)#13794 (33) { ["entity_id"]=> string(5) "57567" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080493138" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:37:06" ["updated_at"]=> string(19) "2025-07-24 09:37:06" ["price"]=> string(9) "29.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "29.990000" ["minimal_price"]=> string(9) "29.990000" ["min_price"]=> string(9) "29.990000" ["max_price"]=> string(9) "29.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(1) ["name"]=> string(35) "Writing Security Tools and Exploits" ["image"]=> string(22) "/9/7/9780080493138.jpg" ["small_image"]=> string(22) "/9/7/9780080493138.jpg" ["thumbnail"]=> string(22) "/9/7/9780080493138.jpg" ["image_label"]=> string(35) "Writing Security Tools and Exploits" ["small_image_label"]=> string(35) "Writing Security Tools and Exploits" ["thumbnail_label"]=> string(35) "Writing Security Tools and Exploits" ["url_key"]=> string(35) "writing-security-tools-and-exploits" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated ex" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(40) "writing-security-tools-and-exploits.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Writing Security Tools and Exploits will be the foremost authority...

    Rating:
    0%
    £29.99
    Add to Wish List
  3. Hack the Stack object(Magento\Catalog\Model\Product\Interceptor)#14201 (33) { ["entity_id"]=> string(5) "59137" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080507743" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:04:20" ["updated_at"]=> string(19) "2025-07-24 12:04:20" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(2) ["name"]=> string(14) "Hack the Stack" ["image"]=> string(22) "/9/7/9780080507743.jpg" ["small_image"]=> string(22) "/9/7/9780080507743.jpg" ["thumbnail"]=> string(22) "/9/7/9780080507743.jpg" ["image_label"]=> string(14) "Hack the Stack" ["small_image_label"]=> string(14) "Hack the Stack" ["thumbnail_label"]=> string(14) "Hack the Stack" ["url_key"]=> string(14) "hack-the-stack" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "e;stack"e; -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and e" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(19) "hack-the-stack.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book looks at network security in a new and...

    Rating:
    0%
    £31.99
    Add to Wish List
  4. Developer's Guide to Web Application Security object(Magento\Catalog\Model\Product\Interceptor)#13843 (33) { ["entity_id"]=> string(5) "59446" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080504094" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:10:14" ["updated_at"]=> string(19) "2025-07-24 12:10:14" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(3) ["name"]=> string(45) "Developer's Guide to Web Application Security" ["image"]=> string(22) "/9/7/9780080504094.jpg" ["small_image"]=> string(22) "/9/7/9780080504094.jpg" ["thumbnail"]=> string(22) "/9/7/9780080504094.jpg" ["image_label"]=> string(45) "Developer's Guide to Web Application Security" ["small_image_label"]=> string(45) "Developer's Guide to Web Application Security" ["thumbnail_label"]=> string(45) "Developer's Guide to Web Application Security" ["url_key"]=> string(45) "developer-s-guide-to-web-application-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerab" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(50) "developer-s-guide-to-web-application-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Over 75% of network attacks are targeted at the web...

    Rating:
    0%
    £31.99
    Add to Wish List
  5. Configuring Juniper Networks NetScreen and SSG Firewalls object(Magento\Catalog\Model\Product\Interceptor)#13833 (33) { ["entity_id"]=> string(5) "59931" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080502847" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:21:11" ["updated_at"]=> string(19) "2025-07-24 12:21:11" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(4) ["name"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["image"]=> string(22) "/9/7/9780080502847.jpg" ["small_image"]=> string(22) "/9/7/9780080502847.jpg" ["thumbnail"]=> string(22) "/9/7/9780080502847.jpg" ["image_label"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["small_image_label"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["thumbnail_label"]=> string(56) "Configuring Juniper Networks NetScreen and SSG Firewalls" ["url_key"]=> string(56) "configuring-juniper-networks-netscreen-and-ssg-firewalls" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security pro" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(61) "configuring-juniper-networks-netscreen-and-ssg-firewalls.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Juniper Networks Secure Access SSL VPN appliances provide a complete...

    Rating:
    0%
    £30.99
    Add to Wish List
  6. How to Cheat at Securing a Wireless Network object(Magento\Catalog\Model\Product\Interceptor)#13807 (33) { ["entity_id"]=> string(5) "59993" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080508221" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:22:44" ["updated_at"]=> string(19) "2025-07-24 12:22:44" ["price"]=> string(9) "24.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "24.990000" ["minimal_price"]=> string(9) "24.990000" ["min_price"]=> string(9) "24.990000" ["max_price"]=> string(9) "24.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(5) ["name"]=> string(43) "How to Cheat at Securing a Wireless Network" ["image"]=> string(22) "/9/7/9780080508221.jpg" ["small_image"]=> string(22) "/9/7/9780080508221.jpg" ["thumbnail"]=> string(22) "/9/7/9780080508221.jpg" ["image_label"]=> string(43) "How to Cheat at Securing a Wireless Network" ["small_image_label"]=> string(43) "How to Cheat at Securing a Wireless Network" ["thumbnail_label"]=> string(43) "How to Cheat at Securing a Wireless Network" ["url_key"]=> string(43) "how-to-cheat-at-securing-a-wireless-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "how-to-cheat-at-securing-a-wireless-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Wireless connectivity is now a reality in most businesses. Yet...

    Rating:
    0%
    £24.99
    Add to Wish List
  7. Secure Your Network for Free object(Magento\Catalog\Model\Product\Interceptor)#13812 (33) { ["entity_id"]=> string(5) "60207" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080516813" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:27:31" ["updated_at"]=> string(19) "2025-07-24 12:27:31" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(6) ["name"]=> string(28) "Secure Your Network for Free" ["image"]=> string(22) "/9/7/9780080516813.jpg" ["small_image"]=> string(22) "/9/7/9780080516813.jpg" ["thumbnail"]=> string(22) "/9/7/9780080516813.jpg" ["image_label"]=> string(28) "Secure Your Network for Free" ["small_image_label"]=> string(28) "Secure Your Network for Free" ["thumbnail_label"]=> string(28) "Secure Your Network for Free" ["url_key"]=> string(28) "secure-your-network-for-free" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to ge" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "secure-your-network-for-free.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This is the only book to clearly demonstrate how to...

    Rating:
    0%
    £25.99
    Add to Wish List
  8. Stealing the Network: How to Own an Identity object(Magento\Catalog\Model\Product\Interceptor)#13832 (33) { ["entity_id"]=> string(5) "61117" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080517742" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:48:24" ["updated_at"]=> string(19) "2025-07-24 12:48:24" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(7) ["name"]=> string(44) "Stealing the Network: How to Own an Identity" ["image"]=> string(22) "/9/7/9780080517742.jpg" ["small_image"]=> string(22) "/9/7/9780080517742.jpg" ["thumbnail"]=> string(22) "/9/7/9780080517742.jpg" ["image_label"]=> string(44) "Stealing the Network: How to Own an Identity" ["small_image_label"]=> string(44) "Stealing the Network: How to Own an Identity" ["thumbnail_label"]=> string(44) "Stealing the Network: How to Own an Identity" ["url_key"]=> string(43) "stealing-the-network-how-to-own-an-identity" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The first two books in this series "e;Stealing the Network: How to Own the Box and "e;Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of crimi" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "stealing-the-network-how-to-own-an-identity.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The first two books in this series "e;Stealing the Network:...

    Rating:
    0%
    £25.99
    Add to Wish List
  9. How to Cheat at IIS 7 Server Administration object(Magento\Catalog\Model\Product\Interceptor)#13831 (33) { ["entity_id"]=> string(5) "66894" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553542" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:56:31" ["updated_at"]=> string(19) "2025-07-24 14:56:31" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(8) ["name"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["image"]=> string(22) "/9/7/9780080553542.jpg" ["small_image"]=> string(22) "/9/7/9780080553542.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553542.jpg" ["image_label"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["small_image_label"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["thumbnail_label"]=> string(43) "How to Cheat at IIS 7 Server Administration" ["url_key"]=> string(43) "how-to-cheat-at-iis-7-server-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(48) "how-to-cheat-at-iis-7-server-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    According to Microsoft, Internet Information Services (IIS) 7.0 is a...

    Rating:
    0%
    £31.99
    Add to Wish List
  10. How to Cheat at Configuring Exchange Server 2007 object(Magento\Catalog\Model\Product\Interceptor)#13830 (33) { ["entity_id"]=> string(5) "66961" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080554204" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:58:04" ["updated_at"]=> string(19) "2025-07-24 14:58:04" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(9) ["name"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["image"]=> string(22) "/9/7/9780080554204.jpg" ["small_image"]=> string(22) "/9/7/9780080554204.jpg" ["thumbnail"]=> string(22) "/9/7/9780080554204.jpg" ["image_label"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["small_image_label"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["thumbnail_label"]=> string(48) "How to Cheat at Configuring Exchange Server 2007" ["url_key"]=> string(48) "how-to-cheat-at-configuring-exchange-server-2007" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will pr" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "how-to-cheat-at-configuring-exchange-server-2007.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Perfect Reference for the Multitasked System AdministratorsThe new version...

    Rating:
    0%
    £25.99
    Add to Wish List
  11. Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators object(Magento\Catalog\Model\Product\Interceptor)#13829 (33) { ["entity_id"]=> string(5) "66935" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553979" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:57:25" ["updated_at"]=> string(19) "2025-07-24 14:57:25" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(10) ["name"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["image"]=> string(22) "/9/7/9780080553979.jpg" ["small_image"]=> string(22) "/9/7/9780080553979.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553979.jpg" ["image_label"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["small_image_label"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["thumbnail_label"]=> string(86) "Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators" ["url_key"]=> string(84) "techno-security-s-guide-to-managing-risks-for-it-managers-auditors-and-investigators" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) ""e;This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(89) "techno-security-s-guide-to-managing-risks-for-it-managers-auditors-and-investigators.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    "e;This book contains some of the most up-to-date information available...

    Rating:
    0%
    £38.99
    Add to Wish List
  12. Netcat Power Tools object(Magento\Catalog\Model\Product\Interceptor)#13828 (33) { ["entity_id"]=> string(5) "54723" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558738" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:33:28" ["updated_at"]=> string(19) "2025-07-24 15:14:38" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(11) ["name"]=> string(18) "Netcat Power Tools" ["image"]=> string(24) "/9/7/9780080558738_1.jpg" ["small_image"]=> string(24) "/9/7/9780080558738_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780080558738_1.jpg" ["image_label"]=> string(18) "Netcat Power Tools" ["small_image_label"]=> string(18) "Netcat Power Tools" ["thumbnail_label"]=> string(18) "Netcat Power Tools" ["url_key"]=> string(18) "netcat-power-tools" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often ref" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(23) "netcat-power-tools.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Originally released in 1996, Netcat is a netowrking program designed...

    Rating:
    0%
    £36.99
    Add to Wish List
  13. The Books You Need to Read in 2025
    The Children's Books You Need to Read in 2025
    The Non-Fiction You Need to Read in 2025
    The Fiction You Need to Read in 2025
  14. How to Cheat at Securing Your Network object(Magento\Catalog\Model\Product\Interceptor)#13827 (33) { ["entity_id"]=> string(5) "67726" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558646" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:14:47" ["updated_at"]=> string(19) "2025-07-24 15:14:47" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(12) ["name"]=> string(37) "How to Cheat at Securing Your Network" ["image"]=> string(22) "/9/7/9780080558646.jpg" ["small_image"]=> string(22) "/9/7/9780080558646.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558646.jpg" ["image_label"]=> string(37) "How to Cheat at Securing Your Network" ["small_image_label"]=> string(37) "How to Cheat at Securing Your Network" ["thumbnail_label"]=> string(37) "How to Cheat at Securing Your Network" ["url_key"]=> string(37) "how-to-cheat-at-securing-your-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(42) "how-to-cheat-at-securing-your-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Most Systems Administrators are not security specialists. Keeping the network...

    Rating:
    0%
    £31.99
    Add to Wish List
  15. InfoSecurity 2008 Threat Analysis object(Magento\Catalog\Model\Product\Interceptor)#13826 (33) { ["entity_id"]=> string(5) "67774" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558691" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:04" ["updated_at"]=> string(19) "2025-07-24 15:16:04" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(13) ["name"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["image"]=> string(22) "/9/7/9780080558691.jpg" ["small_image"]=> string(22) "/9/7/9780080558691.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558691.jpg" ["image_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["small_image_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["thumbnail_label"]=> string(33) "InfoSecurity 2008 Threat Analysis" ["url_key"]=> string(33) "infosecurity-2008-threat-analysis" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing en" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(38) "infosecurity-2008-threat-analysis.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    An all-star cast of authors analyze the top IT security...

    Rating:
    0%
    £38.99
    Add to Wish List
  16. Managing Catastrophic Loss of Sensitive Data object(Magento\Catalog\Model\Product\Interceptor)#13825 (33) { ["entity_id"]=> string(5) "67776" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080558714" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:16:07" ["updated_at"]=> string(19) "2025-07-24 15:16:07" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(14) ["name"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["image"]=> string(22) "/9/7/9780080558714.jpg" ["small_image"]=> string(22) "/9/7/9780080558714.jpg" ["thumbnail"]=> string(22) "/9/7/9780080558714.jpg" ["image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["small_image_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["thumbnail_label"]=> string(44) "Managing Catastrophic Loss of Sensitive Data" ["url_key"]=> string(44) "managing-catastrophic-loss-of-sensitive-data" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadma" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "managing-catastrophic-loss-of-sensitive-data.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Offering a structured approach to handling and recovering from a...

    Rating:
    0%
    £38.99
    Add to Wish List
  17. Network Security: Know It All object(Magento\Catalog\Model\Product\Interceptor)#13824 (33) { ["entity_id"]=> string(5) "67908" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080560151" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:19:47" ["updated_at"]=> string(19) "2025-07-24 15:19:47" ["price"]=> string(9) "56.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "56.990000" ["minimal_price"]=> string(9) "56.990000" ["min_price"]=> string(9) "56.990000" ["max_price"]=> string(9) "56.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(15) ["name"]=> string(29) "Network Security: Know It All" ["image"]=> string(22) "/9/7/9780080560151.jpg" ["small_image"]=> string(22) "/9/7/9780080560151.jpg" ["thumbnail"]=> string(22) "/9/7/9780080560151.jpg" ["image_label"]=> string(29) "Network Security: Know It All" ["small_image_label"]=> string(29) "Network Security: Know It All" ["thumbnail_label"]=> string(29) "Network Security: Know It All" ["url_key"]=> string(28) "network-security-know-it-all" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-t" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "network-security-know-it-all.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Network Security: Know It All explains the basics, describes the...

    Rating:
    0%
    £56.99
    Add to Wish List
  18. Dr. Tom Shinder's ISA Server 2006 Migration Guide object(Magento\Catalog\Model\Product\Interceptor)#13823 (33) { ["entity_id"]=> string(5) "67253" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555515" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:03:50" ["updated_at"]=> string(19) "2025-07-24 15:03:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(16) ["name"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["image"]=> string(22) "/9/7/9780080555515.jpg" ["small_image"]=> string(22) "/9/7/9780080555515.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555515.jpg" ["image_label"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["small_image_label"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["thumbnail_label"]=> string(49) "Dr. Tom Shinder's ISA Server 2006 Migration Guide" ["url_key"]=> string(48) "dr-tom-shinder-s-isa-server-2006-migration-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of th" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(53) "dr-tom-shinder-s-isa-server-2006-migration-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a...

    Rating:
    0%
    £31.99
    Add to Wish List
  19. Juniper(r) Networks Secure Access SSL VPN Configuration Guide object(Magento\Catalog\Model\Product\Interceptor)#13822 (33) { ["entity_id"]=> string(5) "67388" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080556635" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:07:08" ["updated_at"]=> string(19) "2025-07-24 15:07:08" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(17) ["name"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["image"]=> string(22) "/9/7/9780080556635.jpg" ["small_image"]=> string(22) "/9/7/9780080556635.jpg" ["thumbnail"]=> string(22) "/9/7/9780080556635.jpg" ["image_label"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["small_image_label"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["thumbnail_label"]=> string(61) "Juniper(r) Networks Secure Access SSL VPN Configuration Guide" ["url_key"]=> string(60) "juniper-r-networks-secure-access-ssl-vpn-configuration-guide" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration gui" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(65) "juniper-r-networks-secure-access-ssl-vpn-configuration-guide.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Juniper Networks Secure Access SSL VPN appliances provide a complete...

    Rating:
    0%
    £38.99
    Add to Wish List
  20. Wireless Security object(Magento\Catalog\Model\Product\Interceptor)#13821 (33) { ["entity_id"]=> string(5) "49666" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228328" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:41:09" ["updated_at"]=> string(19) "2025-07-24 06:50:06" ["price"]=> string(9) "54.900000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.900000" ["minimal_price"]=> string(9) "54.900000" ["min_price"]=> string(9) "54.900000" ["max_price"]=> string(9) "54.900000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(18) ["name"]=> string(17) "Wireless Security" ["image"]=> string(24) "/9/7/9780072228328_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228328_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228328_1.jpg" ["image_label"]=> string(17) "Wireless Security" ["small_image_label"]=> string(17) "Wireless Security" ["thumbnail_label"]=> string(17) "Wireless Security" ["url_key"]=> string(17) "wireless-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by " ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(22) "wireless-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Get full details on major mobile/wireless clients and operating systems--including...

    Rating:
    0%
    £54.90
    Add to Wish List
  21. AI-Driven Cybersecurity and Threat Intelligence object(Magento\Catalog\Model\Product\Interceptor)#13820 (27) { ["entity_id"]=> string(5) "49317" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031544972" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:33:21" ["updated_at"]=> string(19) "2025-07-24 06:42:45" ["price"]=> string(10) "149.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "149.990000" ["minimal_price"]=> string(10) "149.990000" ["min_price"]=> string(10) "149.990000" ["max_price"]=> string(10) "149.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(19) ["name"]=> string(47) "AI-Driven Cybersecurity and Threat Intelligence" ["image_label"]=> string(47) "AI-Driven Cybersecurity and Threat Intelligence" ["url_key"]=> string(47) "ai-driven-cybersecurity-and-threat-intelligence" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book in" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(52) "ai-driven-cybersecurity-and-threat-intelligence.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book explores the dynamics of how AI (Artificial Intelligence)...

    Rating:
    0%
    £149.99
    Add to Wish List
  22. XML Security object(Magento\Catalog\Model\Product\Interceptor)#13819 (33) { ["entity_id"]=> string(5) "49650" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780072228083" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:40:42" ["updated_at"]=> string(19) "2025-07-24 06:49:37" ["price"]=> string(9) "65.700000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "65.700000" ["minimal_price"]=> string(9) "65.700000" ["min_price"]=> string(9) "65.700000" ["max_price"]=> string(9) "65.700000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(20) ["name"]=> string(12) "XML Security" ["image"]=> string(24) "/9/7/9780072228083_1.jpg" ["small_image"]=> string(24) "/9/7/9780072228083_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780072228083_1.jpg" ["image_label"]=> string(12) "XML Security" ["small_image_label"]=> string(12) "XML Security" ["thumbnail_label"]=> string(12) "XML Security" ["url_key"]=> string(12) "xml-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Use this book as both an XML primer and to get up to speed on XML-related security issues. Written by the experts at RSA Security, Inc., you'll get inside tips on how to prevent denial of service attacks, and how to implement security measures to keep you" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(17) "xml-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Use this book as both an XML primer and to...

    Rating:
    0%
    £65.70
    Add to Wish List
  23. Certification Press object(Magento\Catalog\Model\Product\Interceptor)#13808 (33) { ["entity_id"]=> string(5) "48676" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071834278" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 17:46:36" ["updated_at"]=> string(19) "2025-07-24 06:30:22" ["price"]=> string(9) "63.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "63.000000" ["minimal_price"]=> string(9) "63.000000" ["min_price"]=> string(9) "63.000000" ["max_price"]=> string(9) "63.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(21) ["name"]=> string(19) "Certification Press" ["image"]=> string(24) "/9/7/9780071834278_2.jpg" ["small_image"]=> string(24) "/9/7/9780071834278_2.jpg" ["thumbnail"]=> string(24) "/9/7/9780071834278_2.jpg" ["image_label"]=> string(19) "Certification Press" ["small_image_label"]=> string(19) "Certification Press" ["thumbnail_label"]=> string(19) "Certification Press" ["url_key"]=> string(19) "certification-press" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Fully revised to cover the 2014 CompTIA Security+ objectives, this is a money-saving self-study bundle with bonus study materialsPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "certification-press.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Fully revised to cover the 2014 CompTIA Security+ objectives, this...

    Rating:
    0%
    £63.00
    Add to Wish List
  24. CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401) object(Magento\Catalog\Model\Product\Interceptor)#13811 (33) { ["entity_id"]=> string(5) "48877" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071837354" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:23:24" ["updated_at"]=> string(19) "2025-07-24 06:33:56" ["price"]=> string(9) "54.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.000000" ["minimal_price"]=> string(9) "54.000000" ["min_price"]=> string(9) "54.000000" ["max_price"]=> string(9) "54.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(22) ["name"]=> string(70) "CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)" ["image"]=> string(24) "/9/7/9780071837354_1.jpg" ["small_image"]=> string(24) "/9/7/9780071837354_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780071837354_1.jpg" ["image_label"]=> string(70) "CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)" ["small_image_label"]=> string(70) "CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)" ["thumbnail_label"]=> string(70) "CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)" ["url_key"]=> string(66) "comptia-security-all-in-one-exam-guide-fourth-edition-exam-sy0-401" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for secu" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(71) "comptia-security-all-in-one-exam-guide-fourth-edition-exam-sy0-401.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Get complete coverage of all objectives included on the latest...

    Rating:
    0%
    £54.00
    Add to Wish List
  25. Mike Meyers'' Certficiation Passport object(Magento\Catalog\Model\Product\Interceptor)#13817 (33) { ["entity_id"]=> string(5) "48599" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071832175" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 17:42:27" ["updated_at"]=> string(19) "2025-07-24 06:28:42" ["price"]=> string(9) "27.000000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "27.000000" ["minimal_price"]=> string(9) "27.000000" ["min_price"]=> string(9) "27.000000" ["max_price"]=> string(9) "27.000000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(23) ["name"]=> string(36) "Mike Meyers'' Certficiation Passport" ["image"]=> string(24) "/9/7/9780071832175_2.jpg" ["small_image"]=> string(24) "/9/7/9780071832175_2.jpg" ["thumbnail"]=> string(24) "/9/7/9780071832175_2.jpg" ["image_label"]=> string(36) "Mike Meyers'' Certficiation Passport" ["small_image_label"]=> string(36) "Mike Meyers'' Certficiation Passport" ["thumbnail_label"]=> string(36) "Mike Meyers'' Certficiation Passport" ["url_key"]=> string(34) "mike-meyers-certficiation-passport" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "From the #1 Name in Professional CertificationPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exa" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(39) "mike-meyers-certficiation-passport.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    From the #1 Name in Professional CertificationPrepare for CompTIA Security+...

    Rating:
    0%
    £27.00
    Add to Wish List
  26. Principles of Computer Security, Fourth Edition object(Magento\Catalog\Model\Product\Interceptor)#13814 (33) { ["entity_id"]=> string(5) "48805" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780071836012" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-23 18:21:58" ["updated_at"]=> string(19) "2025-07-24 06:32:37" ["price"]=> string(9) "89.100000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "89.100000" ["minimal_price"]=> string(9) "89.100000" ["min_price"]=> string(9) "89.100000" ["max_price"]=> string(9) "89.100000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(24) ["name"]=> string(47) "Principles of Computer Security, Fourth Edition" ["image"]=> string(24) "/9/7/9780071836012_1.jpg" ["small_image"]=> string(24) "/9/7/9780071836012_1.jpg" ["thumbnail"]=> string(24) "/9/7/9780071836012_1.jpg" ["image_label"]=> string(47) "Principles of Computer Security, Fourth Edition" ["small_image_label"]=> string(47) "Principles of Computer Security, Fourth Edition" ["thumbnail_label"]=> string(47) "Principles of Computer Security, Fourth Edition" ["url_key"]=> string(46) "principles-of-computer-security-fourth-edition" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+.Principles of Computer Security, Fourth Edition is a student-tested, introductory c" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(51) "principles-of-computer-security-fourth-edition.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by leading information security educators, this fully revised, full-color...

    Rating:
    0%
    £89.10
    Add to Wish List
  27. Mastering Information Security Compliance Management object(Magento\Catalog\Model\Product\Interceptor)#13809 (27) { ["entity_id"]=> string(5) "53972" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781803243160" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:21:04" ["updated_at"]=> string(19) "2025-07-24 08:21:04" ["price"]=> string(9) "23.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "23.990000" ["minimal_price"]=> string(9) "23.990000" ["min_price"]=> string(9) "23.990000" ["max_price"]=> string(9) "23.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(25) ["name"]=> string(52) "Mastering Information Security Compliance Management" ["image_label"]=> string(52) "Mastering Information Security Compliance Management" ["url_key"]=> string(52) "mastering-information-security-compliance-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standardsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesFamiliarize yoursel" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(57) "mastering-information-security-compliance-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Strengthen your ability to implement, assess, evaluate, and enhance the...

    Rating:
    0%
    £23.99
    Add to Wish List
  28. Cloud Defense Strategies with Azure Sentinel object(Magento\Catalog\Model\Product\Interceptor)#13818 (27) { ["entity_id"]=> string(5) "52506" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484271322" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:57:03" ["updated_at"]=> string(19) "2025-07-24 07:57:03" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(26) ["name"]=> string(44) "Cloud Defense Strategies with Azure Sentinel" ["image_label"]=> string(44) "Cloud Defense Strategies with Azure Sentinel" ["url_key"]=> string(44) "cloud-defense-strategies-with-azure-sentinel" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active D" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(49) "cloud-defense-strategies-with-azure-sentinel.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Use various defense strategies with Azure Sentinel to enhance your cloud...

    Rating:
    0%
    £54.99
    Add to Wish List
  29. Identity Attack Vectors object(Magento\Catalog\Model\Product\Interceptor)#13795 (27) { ["entity_id"]=> string(5) "52548" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484251652" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 07:58:00" ["updated_at"]=> string(19) "2025-07-24 07:58:00" ["price"]=> string(9) "39.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "39.990000" ["minimal_price"]=> string(9) "39.990000" ["min_price"]=> string(9) "39.990000" ["max_price"]=> string(9) "39.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(27) ["name"]=> string(23) "Identity Attack Vectors" ["image_label"]=> string(23) "Identity Attack Vectors" ["url_key"]=> string(23) "identity-attack-vectors" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "identity-attack-vectors.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Discover how poor identity and privilege management can be leveraged...

    Rating:
    0%
    £39.99
    Add to Wish List
  30. Bulletproof Wireless Security object(Magento\Catalog\Model\Product\Interceptor)#14196 (33) { ["entity_id"]=> string(5) "55202" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476315" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:42:20" ["updated_at"]=> string(19) "2025-07-24 08:42:20" ["price"]=> string(9) "43.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "43.990000" ["minimal_price"]=> string(9) "43.990000" ["min_price"]=> string(9) "43.990000" ["max_price"]=> string(9) "43.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(29) ["name"]=> string(29) "Bulletproof Wireless Security" ["image"]=> string(22) "/9/7/9780080476315.jpg" ["small_image"]=> string(22) "/9/7/9780080476315.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476315.jpg" ["image_label"]=> string(29) "Bulletproof Wireless Security" ["small_image_label"]=> string(29) "Bulletproof Wireless Security" ["thumbnail_label"]=> string(29) "Bulletproof Wireless Security" ["url_key"]=> string(29) "bulletproof-wireless-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Finally--a single volume guide to really effective security for both voice and data wireless networks!More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "e;bul" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "bulletproof-wireless-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Finally--a single volume guide to really effective security for both...

    Rating:
    0%
    £43.99
    Add to Wish List
  31. Configuring Windows 2000 without Active Directory object(Magento\Catalog\Model\Product\Interceptor)#14197 (33) { ["entity_id"]=> string(5) "55273" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080476728" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:43:43" ["updated_at"]=> string(19) "2025-07-24 08:43:43" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(30) ["name"]=> string(49) "Configuring Windows 2000 without Active Directory" ["image"]=> string(22) "/9/7/9780080476728.jpg" ["small_image"]=> string(22) "/9/7/9780080476728.jpg" ["thumbnail"]=> string(22) "/9/7/9780080476728.jpg" ["image_label"]=> string(49) "Configuring Windows 2000 without Active Directory" ["small_image_label"]=> string(49) "Configuring Windows 2000 without Active Directory" ["thumbnail_label"]=> string(49) "Configuring Windows 2000 without Active Directory" ["url_key"]=> string(49) "configuring-windows-2000-without-active-directory" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Eliminate the hassles of Active Directory - install Windows 2000 without it!Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising its impressive ab" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(54) "configuring-windows-2000-without-active-directory.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Eliminate the hassles of Active Directory - install Windows 2000...

    Rating:
    0%
    £31.99
    Add to Wish List
  32. Hack Proofing Sun Solaris 8 object(Magento\Catalog\Model\Product\Interceptor)#14199 (33) { ["entity_id"]=> string(5) "55537" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478128" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:49" ["updated_at"]=> string(19) "2025-07-24 08:58:49" ["price"]=> string(9) "38.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "38.990000" ["minimal_price"]=> string(9) "38.990000" ["min_price"]=> string(9) "38.990000" ["max_price"]=> string(9) "38.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(31) ["name"]=> string(27) "Hack Proofing Sun Solaris 8" ["image"]=> string(22) "/9/7/9780080478128.jpg" ["small_image"]=> string(22) "/9/7/9780080478128.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478128.jpg" ["image_label"]=> string(27) "Hack Proofing Sun Solaris 8" ["small_image_label"]=> string(27) "Hack Proofing Sun Solaris 8" ["thumbnail_label"]=> string(27) "Hack Proofing Sun Solaris 8" ["url_key"]=> string(27) "hack-proofing-sun-solaris-8" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The only way to stop a hacker is to think like one!Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(32) "hack-proofing-sun-solaris-8.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The only way to stop a hacker is to think...

    Rating:
    0%
    £38.99
    Add to Wish List
  33. Hack Proofing Your Network object(Magento\Catalog\Model\Product\Interceptor)#14203 (33) { ["entity_id"]=> string(5) "55541" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080478166" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:58:54" ["updated_at"]=> string(19) "2025-07-24 08:58:54" ["price"]=> string(9) "30.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "30.990000" ["minimal_price"]=> string(9) "30.990000" ["min_price"]=> string(9) "30.990000" ["max_price"]=> string(9) "30.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(32) ["name"]=> string(26) "Hack Proofing Your Network" ["image"]=> string(22) "/9/7/9780080478166.jpg" ["small_image"]=> string(22) "/9/7/9780080478166.jpg" ["thumbnail"]=> string(22) "/9/7/9780080478166.jpg" ["image_label"]=> string(26) "Hack Proofing Your Network" ["small_image_label"]=> string(26) "Hack Proofing Your Network" ["thumbnail_label"]=> string(26) "Hack Proofing Your Network" ["url_key"]=> string(26) "hack-proofing-your-network" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "A new edition the most popular Hack Proofing book around!IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(31) "hack-proofing-your-network.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A new edition the most popular Hack Proofing book around!IT...

    Rating:
    0%
    £30.99
    Add to Wish List
  34. Aggressive Network Self-Defense object(Magento\Catalog\Model\Product\Interceptor)#14202 (33) { ["entity_id"]=> string(5) "56602" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488295" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:18:50" ["updated_at"]=> string(19) "2025-07-24 09:18:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(33) ["name"]=> string(31) "Aggressive Network Self-Defense" ["image"]=> string(22) "/9/7/9780080488295.jpg" ["small_image"]=> string(22) "/9/7/9780080488295.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488295.jpg" ["image_label"]=> string(31) "Aggressive Network Self-Defense" ["small_image_label"]=> string(31) "Aggressive Network Self-Defense" ["thumbnail_label"]=> string(31) "Aggressive Network Self-Defense" ["url_key"]=> string(31) "aggressive-network-self-defense" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reachin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "aggressive-network-self-defense.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Over the past year there has been a shift within...

    Rating:
    0%
    £31.99
    Add to Wish List
  35. Security Assessment object(Magento\Catalog\Model\Product\Interceptor)#14204 (33) { ["entity_id"]=> string(5) "56171" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080480824" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:11:17" ["updated_at"]=> string(19) "2025-07-24 09:11:17" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(34) ["name"]=> string(19) "Security Assessment" ["image"]=> string(22) "/9/7/9780080480824.jpg" ["small_image"]=> string(22) "/9/7/9780080480824.jpg" ["thumbnail"]=> string(22) "/9/7/9780080480824.jpg" ["image_label"]=> string(19) "Security Assessment" ["small_image_label"]=> string(19) "Security Assessment" ["thumbnail_label"]=> string(19) "Security Assessment" ["url_key"]=> string(19) "security-assessment" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(24) "security-assessment.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines...

    Rating:
    0%
    £44.99
    Add to Wish List
  36. Buffer Overflow Attacks object(Magento\Catalog\Model\Product\Interceptor)#14205 (33) { ["entity_id"]=> string(5) "56648" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080488424" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:19:57" ["updated_at"]=> string(19) "2025-07-24 09:19:57" ["price"]=> string(9) "22.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "22.990000" ["minimal_price"]=> string(9) "22.990000" ["min_price"]=> string(9) "22.990000" ["max_price"]=> string(9) "22.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(35) ["name"]=> string(23) "Buffer Overflow Attacks" ["image"]=> string(22) "/9/7/9780080488424.jpg" ["small_image"]=> string(22) "/9/7/9780080488424.jpg" ["thumbnail"]=> string(22) "/9/7/9780080488424.jpg" ["image_label"]=> string(23) "Buffer Overflow Attacks" ["small_image_label"]=> string(23) "Buffer Overflow Attacks" ["thumbnail_label"]=> string(23) "Buffer Overflow Attacks" ["url_key"]=> string(23) "buffer-overflow-attacks" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The SANS Institute maintains a list of the "e;Top 10 Software Vulnerabilities."e; At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dange" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "buffer-overflow-attacks.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The SANS Institute maintains a list of the "e;Top 10...

    Rating:
    0%
    £22.99
    Add to Wish List
  37. Bug Bounty from Scratch object(Magento\Catalog\Model\Product\Interceptor)#14206 (27) { ["entity_id"]=> string(5) "57988" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781803239521" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:44:10" ["updated_at"]=> string(19) "2025-07-24 09:44:10" ["price"]=> string(9) "23.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "23.990000" ["minimal_price"]=> string(9) "23.990000" ["min_price"]=> string(9) "23.990000" ["max_price"]=> string(9) "23.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(36) ["name"]=> string(23) "Bug Bounty from Scratch" ["image_label"]=> string(23) "Bug Bounty from Scratch" ["url_key"]=> string(23) "bug-bounty-from-scratch" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key FeaturesPrepare to participate in a bug bounty programDiscover your first bug and claim your reward upon successful detectionGo through core sec" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "bug-bounty-from-scratch.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Embark on your bug bounty journey by gaining practical skills...

    Rating:
    0%
    £23.99
    Add to Wish List
  38. Security Log Management object(Magento\Catalog\Model\Product\Interceptor)#14207 (33) { ["entity_id"]=> string(5) "56897" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489704" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:50" ["updated_at"]=> string(19) "2025-07-24 09:24:50" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(37) ["name"]=> string(23) "Security Log Management" ["image"]=> string(22) "/9/7/9780080489704.jpg" ["small_image"]=> string(22) "/9/7/9780080489704.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489704.jpg" ["image_label"]=> string(23) "Security Log Management" ["small_image_label"]=> string(23) "Security Log Management" ["thumbnail_label"]=> string(23) "Security Log Management" ["url_key"]=> string(23) "security-log-management" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(28) "security-log-management.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book teaches IT professionals how to analyze, manage, and...

    Rating:
    0%
    £31.99
    Add to Wish List
  39. Microsoft Log Parser Toolkit object(Magento\Catalog\Model\Product\Interceptor)#14208 (33) { ["entity_id"]=> string(5) "56874" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080489391" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:24:23" ["updated_at"]=> string(19) "2025-07-24 09:24:23" ["price"]=> string(9) "25.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "25.990000" ["minimal_price"]=> string(9) "25.990000" ["min_price"]=> string(9) "25.990000" ["max_price"]=> string(9) "25.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(38) ["name"]=> string(28) "Microsoft Log Parser Toolkit" ["image"]=> string(22) "/9/7/9780080489391.jpg" ["small_image"]=> string(22) "/9/7/9780080489391.jpg" ["thumbnail"]=> string(22) "/9/7/9780080489391.jpg" ["image_label"]=> string(28) "Microsoft Log Parser Toolkit" ["small_image_label"]=> string(28) "Microsoft Log Parser Toolkit" ["thumbnail_label"]=> string(28) "Microsoft Log Parser Toolkit" ["url_key"]=> string(28) "microsoft-log-parser-toolkit" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrat" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "microsoft-log-parser-toolkit.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Written by Microsoft's Log Parser developer, this is the first...

    Rating:
    0%
    £25.99
    Add to Wish List
  40. Wireless Operational Security object(Magento\Catalog\Model\Product\Interceptor)#14209 (33) { ["entity_id"]=> string(5) "61561" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080521190" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:58:46" ["updated_at"]=> string(19) "2025-07-24 12:58:46" ["price"]=> string(9) "56.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "56.990000" ["minimal_price"]=> string(9) "56.990000" ["min_price"]=> string(9) "56.990000" ["max_price"]=> string(9) "56.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(39) ["name"]=> string(29) "Wireless Operational Security" ["image"]=> string(22) "/9/7/9780080521190.jpg" ["small_image"]=> string(22) "/9/7/9780080521190.jpg" ["thumbnail"]=> string(22) "/9/7/9780080521190.jpg" ["image_label"]=> string(29) "Wireless Operational Security" ["small_image_label"]=> string(29) "Wireless Operational Security" ["thumbnail_label"]=> string(29) "Wireless Operational Security" ["url_key"]=> string(29) "wireless-operational-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and requir" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(34) "wireless-operational-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This comprehensive wireless network book addresses the operational and day-to-day...

    Rating:
    0%
    £56.99
    Add to Wish List
  41. Advanced ASP.NET Core 8 Security object(Magento\Catalog\Model\Product\Interceptor)#14210 (27) { ["entity_id"]=> string(5) "59141" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9798868804946" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:04:25" ["updated_at"]=> string(19) "2025-07-24 12:04:25" ["price"]=> string(9) "49.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "49.990000" ["minimal_price"]=> string(9) "49.990000" ["min_price"]=> string(9) "49.990000" ["max_price"]=> string(9) "49.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(40) ["name"]=> string(32) "Advanced ASP.NET Core 8 Security" ["image_label"]=> string(32) "Advanced ASP.NET Core 8 Security" ["url_key"]=> string(31) "advanced-aspnet-core-8-security" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the fram" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(36) "advanced-aspnet-core-8-security.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Most .NET developers do not incorporate security best practices when...

    Rating:
    0%
    £49.99
    Add to Wish List
  42. Adversarial Machine Learning object(Magento\Catalog\Model\Product\Interceptor)#14211 (27) { ["entity_id"]=> string(5) "58414" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783030997724" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 11:51:48" ["updated_at"]=> string(19) "2025-07-24 11:51:48" ["price"]=> string(10) "149.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(10) "149.990000" ["minimal_price"]=> string(10) "149.990000" ["min_price"]=> string(10) "149.990000" ["max_price"]=> string(10) "149.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(41) ["name"]=> string(28) "Adversarial Machine Learning" ["image_label"]=> string(28) "Adversarial Machine Learning" ["url_key"]=> string(28) "adversarial-machine-learning" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unin" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(33) "adversarial-machine-learning.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    A critical challenge in deep learning is the vulnerability of...

    Rating:
    0%
    £149.99
    Add to Wish List
  43. Trojans, Worms, and Spyware object(Magento\Catalog\Model\Product\Interceptor)#14212 (33) { ["entity_id"]=> string(5) "61372" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080519685" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:54:20" ["updated_at"]=> string(19) "2025-07-24 12:54:20" ["price"]=> string(9) "36.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "36.990000" ["minimal_price"]=> string(9) "36.990000" ["min_price"]=> string(9) "36.990000" ["max_price"]=> string(9) "36.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(42) ["name"]=> string(27) "Trojans, Worms, and Spyware" ["image"]=> string(22) "/9/7/9780080519685.jpg" ["small_image"]=> string(22) "/9/7/9780080519685.jpg" ["thumbnail"]=> string(22) "/9/7/9780080519685.jpg" ["image_label"]=> string(27) "Trojans, Worms, and Spyware" ["small_image_label"]=> string(27) "Trojans, Worms, and Spyware" ["thumbnail_label"]=> string(27) "Trojans, Worms, and Spyware" ["url_key"]=> string(25) "trojans-worms-and-spyware" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems securit" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(30) "trojans-worms-and-spyware.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Trojans, Worms, and Spyware provides practical, easy to understand, and...

    Rating:
    0%
    £36.99
    Add to Wish List
  44. How to Cheat at Microsoft Vista Administration object(Magento\Catalog\Model\Product\Interceptor)#14213 (33) { ["entity_id"]=> string(5) "66869" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080553559" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:55:52" ["updated_at"]=> string(19) "2025-07-24 14:55:52" ["price"]=> string(9) "31.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "31.990000" ["minimal_price"]=> string(9) "31.990000" ["min_price"]=> string(9) "31.990000" ["max_price"]=> string(9) "31.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(43) ["name"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["image"]=> string(22) "/9/7/9780080553559.jpg" ["small_image"]=> string(22) "/9/7/9780080553559.jpg" ["thumbnail"]=> string(22) "/9/7/9780080553559.jpg" ["image_label"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["small_image_label"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["thumbnail_label"]=> string(46) "How to Cheat at Microsoft Vista Administration" ["url_key"]=> string(46) "how-to-cheat-at-microsoft-vista-administration" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utili" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(51) "how-to-cheat-at-microsoft-vista-administration.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista...

    Rating:
    0%
    £31.99
    Add to Wish List
  45. Cyber Security Using Modern Technologies object(Magento\Catalog\Model\Product\Interceptor)#14214 (33) { ["entity_id"]=> string(5) "66487" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781000908060" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 14:47:27" ["updated_at"]=> string(19) "2025-07-24 14:47:27" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(44) ["name"]=> string(40) "Cyber Security Using Modern Technologies" ["image"]=> string(22) "/9/7/9781000908060.jpg" ["small_image"]=> string(22) "/9/7/9781000908060.jpg" ["thumbnail"]=> string(22) "/9/7/9781000908060.jpg" ["image_label"]=> string(40) "Cyber Security Using Modern Technologies" ["small_image_label"]=> string(40) "Cyber Security Using Modern Technologies" ["thumbnail_label"]=> string(40) "Cyber Security Using Modern Technologies" ["url_key"]=> string(40) "cyber-security-using-modern-technologies" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(45) "cyber-security-using-modern-technologies.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    The main objective of this book is to introduce cyber...

    Rating:
    0%
    £44.99
    Add to Wish List
  46. Digital Watermarking and Steganography object(Magento\Catalog\Model\Product\Interceptor)#14215 (33) { ["entity_id"]=> string(5) "67281" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9780080555805" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:04:31" ["updated_at"]=> string(19) "2025-07-24 15:04:31" ["price"]=> string(9) "58.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "58.990000" ["minimal_price"]=> string(9) "58.990000" ["min_price"]=> string(9) "58.990000" ["max_price"]=> string(9) "58.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(45) ["name"]=> string(38) "Digital Watermarking and Steganography" ["image"]=> string(22) "/9/7/9780080555805.jpg" ["small_image"]=> string(22) "/9/7/9780080555805.jpg" ["thumbnail"]=> string(22) "/9/7/9780080555805.jpg" ["image_label"]=> string(38) "Digital Watermarking and Steganography" ["small_image_label"]=> string(38) "Digital Watermarking and Steganography" ["thumbnail_label"]=> string(38) "Digital Watermarking and Steganography" ["url_key"]=> string(38) "digital-watermarking-and-steganography" ["msrp_display_actual_price_type"]=> string(1) "0" ["swatch_image"]=> string(12) "no_selection" ["short_description"]=> string(255) "Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(43) "digital-watermarking-and-steganography.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Digital audio, video, images, and documents are flying through cyberspace...

    Rating:
    0%
    £58.99
    Add to Wish List
  47. SpringerBriefs in Electrical and Computer Engineering object(Magento\Catalog\Model\Product\Interceptor)#14216 (27) { ["entity_id"]=> string(5) "67521" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783319758688" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 15:10:03" ["updated_at"]=> string(19) "2025-07-24 15:10:03" ["price"]=> string(9) "44.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "44.990000" ["minimal_price"]=> string(9) "44.990000" ["min_price"]=> string(9) "44.990000" ["max_price"]=> string(9) "44.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(46) ["name"]=> string(53) "SpringerBriefs in Electrical and Computer Engineering" ["image_label"]=> string(53) "SpringerBriefs in Electrical and Computer Engineering" ["url_key"]=> string(53) "springerbriefs-in-electrical-and-computer-engineering" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detaile" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(58) "springerbriefs-in-electrical-and-computer-engineering.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This SpringerBrief provides a comprehensive study of the unique security threats...

    Rating:
    0%
    £44.99
    Add to Wish List
  48. Understand, Manage, and Measure Cyber Risk(R) object(Magento\Catalog\Model\Product\Interceptor)#14217 (27) { ["entity_id"]=> string(5) "55450" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9781484293195" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 08:57:14" ["updated_at"]=> string(19) "2025-07-24 08:57:14" ["price"]=> string(9) "54.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "54.990000" ["minimal_price"]=> string(9) "54.990000" ["min_price"]=> string(9) "54.990000" ["max_price"]=> string(9) "54.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(47) ["name"]=> string(45) "Understand, Manage, and Measure Cyber Risk(R)" ["image_label"]=> string(45) "Understand, Manage, and Measure Cyber Risk(R)" ["url_key"]=> string(42) "understand-manage-and-measure-cyber-risk-r" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "When it comes to managing cybersecurity in an organization, most tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid.A plethora of cybersecurity mana" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(47) "understand-manage-and-measure-cyber-risk-r.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    When it comes to managing cybersecurity in an organization, most...

    Rating:
    0%
    £54.99
    Add to Wish List
  49. Synthesis Lectures on Information Security, Privacy, and Trust object(Magento\Catalog\Model\Product\Interceptor)#14218 (27) { ["entity_id"]=> string(5) "60432" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031597244" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 12:32:48" ["updated_at"]=> string(19) "2025-07-24 12:32:48" ["price"]=> string(9) "69.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "69.990000" ["minimal_price"]=> string(9) "69.990000" ["min_price"]=> string(9) "69.990000" ["max_price"]=> string(9) "69.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(48) ["name"]=> string(62) "Synthesis Lectures on Information Security, Privacy, and Trust" ["image_label"]=> string(62) "Synthesis Lectures on Information Security, Privacy, and Trust" ["url_key"]=> string(60) "synthesis-lectures-on-information-security-privacy-and-trust" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security certification schemes for cloud-edge distributed systems. It gives readers unique and e" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(65) "synthesis-lectures-on-information-security-privacy-and-trust.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    This book, authored by some of the pioneers in the...

    Rating:
    0%
    £69.99
    Add to Wish List
  50. Screening by International Aid Organizations Operating in the Global South object(Magento\Catalog\Model\Product\Interceptor)#14219 (27) { ["entity_id"]=> string(5) "55717" ["attribute_set_id"]=> string(1) "4" ["type_id"]=> string(6) "simple" ["sku"]=> string(13) "9783031541650" ["has_options"]=> string(1) "0" ["required_options"]=> string(1) "0" ["created_at"]=> string(19) "2025-07-24 09:02:25" ["updated_at"]=> string(19) "2025-07-24 09:02:25" ["price"]=> string(9) "32.990000" ["tax_class_id"]=> string(1) "2" ["final_price"]=> string(9) "32.990000" ["minimal_price"]=> string(9) "32.990000" ["min_price"]=> string(9) "32.990000" ["max_price"]=> string(9) "32.990000" ["reviews_count"]=> string(1) "0" ["rating_summary"]=> string(1) "0" ["is_salable"]=> string(1) "1" ["cat_index_position"]=> int(49) ["name"]=> string(74) "Screening by International Aid Organizations Operating in the Global South" ["image_label"]=> string(74) "Screening by International Aid Organizations Operating in the Global South" ["url_key"]=> string(74) "screening-by-international-aid-organizations-operating-in-the-global-south" ["msrp_display_actual_price_type"]=> string(1) "0" ["short_description"]=> string(255) "Aid organizations usually embrace the idea of digitalization, both in terms of using diverse technologies and processing data digitally for improving their services, making their operations more efficient and even mitigating various risks. While digital f" ["worldpay_recurring_enabled"]=> string(1) "0" ["request_path"]=> string(79) "screening-by-international-aid-organizations-operating-in-the-global-south.html" ["store_id"]=> int(1) ["category_id"]=> string(1) "6" }

    Aid organizations usually embrace the idea of digitalization, both in...

    Rating:
    0%
    £32.99
    Add to Wish List
Filter
Set Descending Direction

Items 73-122 of 122

Page
per page