We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£38.48
O'Reilly Adversary Emulation with Mitre Att&ck: Bridging the Gap Between the Red and Blue Teams
Price data last checked 135 day(s) ago - refreshing...
We'll watch every seller, every day. One email when your price arrives.
This is the usual price. Wait for it to drop, or tell us your number.
£38 today · usual range £0–£0 · best ever £34
NEW HERE?
Amazon shows you one price. We show you all of them.
Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.
WHAT'S ON THIS PAGE
when this has been cheap or pricey
where the price is heading next
all-time high & low, recent range
name your number, we'll email you
Price History & Forecast
Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.
Last 68 days • 68 data points (No recent data available)
Price Distribution
Price distribution over 68 days • 6 price levels
Price Analysis
Most common price: £38 (30 days, 44.1%)
Price range: £34 - £44
Price levels: 6 different prices over 68 days
Description
Product Specifications
- Brand
- O'Reilly
- Format
- paperback
- ASIN
- 1098143760
- Category
- Books > Subjects > Computing & Internet > Networking & Security > Introduction to Network & Security
- Domain
- Amazon UK
- Release Date
- 16 May 2025
- Listed Since
- 02 December 2023
Barcode
No barcode data available
Similar Products You Might Like
Cyber-Security Threats, Actors, and Dynamic Mitigation
CRC Press
Malware Analysis Techniques: Tricks for the triage of adversarial software
Packt Publishing
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
Packt Publishing
Threat Modeling: Designing for Security
Wiley
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats
Kogan Page
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
Wiley
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking
CRC Press
Attack Vectors: The History of Cybersecurity
Apress
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition (NETWORKING & COMM - OMG)
McGraw-Hill Education
The Operational Excellence Library; Mastering Pen Testing
Versatile Cybersecurity: 72 (Advances in Information Security, 72)
Springer
CRC Press Intrusion Detection Networks - Collaborative Security
CRC Press
Cyber Threat Hunting
Manning
MAoS - Malware Analysis on Steroids: Fighting Malware to the Death - Real-World Threats and Reverse Engineering Tactics
Springer AI in Cybersecurity: 151 Intelligent Systems Library
Springer
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)
Artech House
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
Syngress
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats: 54 (Advances in Information Security, 54)
Springer
Red Team Engineering: The Art of Building Offensive Tools and Infrastructure
No Starch Press
Advanced Malware Analysis (NETWORKING & COMM - OMG)
McGraw-Hill Education
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
O'Reilly
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Packt Publishing