The highly successful security book returns with a new edition, completely updated Web applications are the front door to most …
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid …
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory …
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on …
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away …
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and …
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of …
The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. …
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, …
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. …
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to …
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, …
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless …
Foreword by Daniel E. Geer Jr., Stuart McClure A ground shaking exposé on the failure of popular cyber risk management …
Dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guideAbout This Book Clear and …
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Unleash the power of CompTIA's newest certification! Linux+ is the next hot certification to come from CompTIA, the company behind …
Key FeaturesFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of …
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no …
An informative guide to implementing and using AWS security services effectively About This Book • Learn to secure your network, …
The best-selling, hands-on roadmap to acing the new Linux+ exam In the newly updated Fifth Edition of CompTIA Linux+ Study …
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side …
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a …
Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks …
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life …