The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering …
There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several …
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other …
Beginning-Intermediate user level
The world's bestselling computer security book--fully expanded and updated"Right now you hold in your hand one of the most successful …
The term cyber-security and an endless list of words prefixed with “cyber” bombard our senses daily. Widely discussed but often …
Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend …
With many of the most important new military systems of the past decade produced by small firms that won competitive …
It is for many years popular to mix marketing and military strategy in the marketing books, starting with Trout's and …
Why and how America’s defense strategy must change in light of China’s power and ambition
5 x 8, 4 b/w photos Selections from four legends in maritime and air strategy: Mahan, Corbett, Douhet and Mitchell …
Build a blue team for efficient cyber threat management in your organizationKey FeaturesExplore blue team operations and understand how to …