A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.This book …
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author …
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android …
""Immerse yourself in the world of distributed storage systems with "Mastering Ceph". Written by an expert in the field, this …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
Uncover hidden patterns of data and respond with countermeasuresSecurity professionals need all the tools at their disposal to increase their …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the …
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing …
VX Underground Black Mass Volume 1
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
Social engineering is an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a …
The primary goal of Black Hat Ruby book is to provide you with a vast angle of using Ruby as …
VMware ESXi 5.1 is written in a Cookbook style, learn through practical real world recipes and examples. VMware ESXi 5.1 …
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing …
The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current …
If you're responsible for securing a Git server where lots of developers work with lots of repositories, you have a …
From the reviews: "This book crystallizes what may become a defining moment in the electronics industry - the shift to …
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
Do you often hear about "trading", "automatic investments", "make money online", "forex" and similar topics?Are you new to the game …
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
Over 170 advanced recipes to search, analyze, deploy, manage, and monitor data effectively with Elasticsearch 5.x About This Book Deploy …
Online Trading is a colossal scam! How many times have you heard this sentence from people who often have never …
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in …
Key FeaturesGet to grips with the basics of Elasticsearch concepts and its APIs, and use them to create efficient applicationsCreate …
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration …
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is …
An example-driven approach to securing Oracle APEX applicationsAs a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to …
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking …
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer …