Feeds

Taking the fight to the hackers

30% off security titles, and more

  • alert
  • submit to reddit

Site offer Q. How does software break?
Q. How do attackers...attack?
Q. Why do security systems not protect us?
Q. How can we improve security?
Q. What tools are used to break software?
A. This week at The Register bookstore we've got 'All the books' with 'ALL the answers!'

  • Exploiting Software
    RRP £37.99 - Reg price - £26.59 - Saving £11.40 (30%)
    This title shows you how to break code - if you want to protect your software from attack, you must first learn how real attacks are really carried out. Using attack patterns, real code, and example exploits, learn techniques that are used by real malicious hackers against software.
  • Malware
    RRP £35.99 - Reg price - £25.19 - Saving £10.80 (30%)
    Discover how attackers install malware and how you can peer through their schemes to keep systems safe from thier viruses, worms, Trojan Horses etc.
  • Biometrics and Network Security
    RRP £35.99 - Reg price - £25.19 - Saving £10.80 (30%)
    The biggest vulnerability in most enterprise networks is the authentication system, this title has guidelines, applications, and procedures for implementing finger, voice, hand geometry, face, and eye biometrics.
  • Enterprise Java™ Security
    RRP £37.99 - Reg price - £26.59 - Saving £11.40 (30%)
    This is the comprehensive guide to Java security that explains the applicability of J2SE and J2EE securtity technologies in building a secure enterprise infrastructure.
  • CCIE Security Practice Labs (CCIE Self-Study)
    RRP £38.99 - Reg price - £27.29 - Saving £11.70 (30%)
    CCIE Security Practice Labs provides a series of complete practice labs that mirror the difficult hands-on lab exam.
  • IPSec
    RRP £35.99 - Reg price - £25.19 - Saving £10.80 (30%)
    The insider's guide to IPSec for every network professional. This title covers architecture, deployment, policies, and the use of IPSec to deliver end-to-end security.
  • CCSP Self-Study
    RRP £46.99 - Reg price - £32.89 - Saving £14.10 (30%)
    Master intrusion detection and other security procedures while learning CSIDS concepts with the only Cisco authorized self-study guide.

Away from the hacking and security for a minute, we've also got titles to cover essential web programming procedures and books to guide your future, your mind and to turn you into a born leader.


  • Defensive Design for the Web
    RRP £23.50 - Reg price - £16.45 - Saving £7.05 (30%)
    Anticipate unexpected user errors and apply contingency plans on how to get users back on track when purchasing on your web site.
  • Designing With Web Standards
    RRP £27.50 - Reg price - £19.25 - Saving £8.25 (30%)
    The be-all-end-all resource on web standards - writing code once for use on today and future browsers. Provides code snippets and web site examples of compliant code in use so that when done correctly all web sites will look the same regardless of the browser.

  • Brilliant Future
    RRP £12.99 - Reg price - £9.09 - Saving £3.90 (30%)
    Most people plan and take charge of their finances but few do the same with their career and life. Welcome to a new concept: the personal career/life planner.
  • The Leadership Mystique
    RRP £19.99 - Reg price - £13.99 - Saving £6.00 (30%)
    In The Leadership Mystique, management and psychology guru Manfred Kets de Vries unpicks the many layers of complexity that underlie effective leadership, and gets to the heart of the day-to-day behavior of leading people in the human enterprise.
  • How to Move Minds and Influence People
    RRP £9.99 - Reg price - £6.99 - Saving £3.00 (30%)
    This book will show you how to create a story to influence anybody, in any situation. Don’t argue, don’t proposition, let a well chosen story smuggle in what you need them to know.

To search or browse other discounted titles available to

The Register

readers click on the links below:

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.