Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author …
There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
Uncover hidden patterns of data and respond with countermeasuresSecurity professionals need all the tools at their disposal to increase their …
Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the …
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the …
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing …
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer …
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
The primary goal of Black Hat Ruby book is to provide you with a vast angle of using Ruby as …
Social engineering is an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a …
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android …
VMware ESXi 5.1 is written in a Cookbook style, learn through practical real world recipes and examples. VMware ESXi 5.1 …
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing …
"Get ready to accelerate your online experience with Web Content Caching and Distribution [8th Intl Wkshp] by Yuli Vasiliev! This …
* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * …
The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
If you're responsible for securing a Git server where lots of developers work with lots of repositories, you have a …
Learn the basics of ElasticSearch like data indexing, analysis, and dynamic mapping Query and filter ElasticSearch for more accurate and …
From the reviews: "This book crystallizes what may become a defining moment in the electronics industry - the shift to …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that …
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect …
""Master the art of network security with 'CompTIA Security+ Student Guide' by Paul Sanghera, a comprehensive study guide specifically designed …
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchKey FeaturesLearn to compromise enterprise networks with …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
An example-driven approach to securing Oracle APEX applicationsAs a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to …
Inside Cisco IOS Software Architecture offers crucial and hard-to-find information on Cisco's Internetwork Operating System (IOS) Software. IOS Software provides …
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other …
Do you often hear about "trading", "automatic investments", "make money online", "forex" and similar topics?Are you new to the game …