A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.This book …
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author …
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android …
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat …
""Immerse yourself in the world of distributed storage systems with "Mastering Ceph". Written by an expert in the field, this …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
Uncover hidden patterns of data and respond with countermeasuresSecurity professionals need all the tools at their disposal to increase their …
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the …
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing …
VX Underground Black Mass Volume 1
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
This is an advanced cookbook and reference guide for digital forensic practitioners. File System Forensic Analysis focuses on the file …
Social engineering is an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a …
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking …
The primary goal of Black Hat Ruby book is to provide you with a vast angle of using Ruby as …
VMware ESXi 5.1 is written in a Cookbook style, learn through practical real world recipes and examples. VMware ESXi 5.1 …
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing …
The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current …
If you're responsible for securing a Git server where lots of developers work with lots of repositories, you have a …
From the reviews: "This book crystallizes what may become a defining moment in the electronics industry - the shift to …
Do you often hear about "trading", "automatic investments", "make money online", "forex" and similar topics?Are you new to the game …
Since the start of the International Workshop on Web Caching and Content Distribution (WCW) in 1996, it has served as …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
"Get ready to accelerate your online experience with Web Content Caching and Distribution [8th Intl Wkshp] by Yuli Vasiliev! This …
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug …
Online Trading is a colossal scam! How many times have you heard this sentence from people who often have never …
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in …
Key FeaturesGet to grips with the basics of Elasticsearch concepts and its APIs, and use them to create efficient applicationsCreate …
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration …