Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers …
The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the …
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid …
Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters. Written to map to the …
Why do nations break into one anothers most important computer networks? There is an obvious answer: to steal valuable information …
Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with …
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself …
Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing In the revamped Second …
This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical …
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land …
Beginning-Intermediate user level
Space is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or …
.
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of …
The world's bestselling computer security book--fully expanded and updated"Right now you hold in your hand one of the most successful …
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following …
The term cyber-security and an endless list of words prefixed with “cyber” bombard our senses daily. Widely discussed but often …
In today's litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting …
If you want to know more about Linux and Python Programming and get a good knowledge of Networking and Hacking, …
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even …
If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how …
I was tasked with building an online course in Cyber security for a major online university, and was assigned the …
How can you protect yourself against an enemy that you can't see? How can you meet the regulations of a …
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book …
Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a major …
Cryptography and Network Security For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is …
For system administrators, network professionals, beginning pentesters, and security consultants. The Art of Network Penetration Testing is a hands-on guide …
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. Key Features Intelligence processes and …
Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed …
Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users …
SEC401.1: Network Security Essentials Overview A key way that attackers gain access to a company's resources is through a network …