Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by …
ASP.NET Core in Action, Second Edition is a comprehensive guide to creating web applications with ASP.NET Core 5.0. Go from …
The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu …
So you're in charge of a network? That's great - and a great big job! Let this book be your …
“Thorough and comprehensive coverage from one of the foremost experts in browser security.” —Tavis Ormandy, Google Inc. Modern web applications …
With a New Introduction by the Author From the oilfields of Saudi Arabia to the Nile delta, from the shipping …
Achieve Linux system administration mastery with time-tested and proven techniques In Mastering Linux System Administration, Linux experts and system administrators …
Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast approaching …
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition …
This is one of the most interesting infosec books to come out in the last several years.–Dino Dai Zovi, Information …
This book is about cryptography as it is used in real-world systems, about cryptography as an engineering discipline rather than …