Hacking Point of Sale
Data-Driven Security
Cybersecurity for Executives
Cyber Threat!
Black Hat Python
Android Security Internals
Android Hacker’s Handbook
Advanced API Security
Server Load Balancing
Designing Large Scale Lans
Mobile Communication Systems
HTTP: The Definitive Guide
Hardening Cisco Routers
Learning Pentesting for Android ...
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are pu ...
Learning Nessus for Penetration ...
IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed secur ...
Kali Linux Network Scanning Coo ...
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of ne ...
Hacking Point of Sale
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
Cybersecurity for Executives
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, i ...
Cyber Threat!
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of go ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Building Virtual Pentesting Lab ...
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...
Black Hat Python
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the mag ...
Anti-Hacker Tool Kit, 4th Editi ...
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Android Hacker’s Handbook
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by expe ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
Cellular Mobile Radio Systems
Most radio systems have become so popular that the available frequency bands are able to meet only a fraction of the demand. This book gives practical ...
Ethernet: The Definitive Guide
Ethernet is a core networking technology used by every high tech business. While the basic protocols have changed little, new options such as Fast Eth ...
Building Internet Firewalls, 2n ...
Completely revised and much expanded, the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix, Linux, and ...
Server Load Balancing
Load balancing improves network performance by distributing traffic efficiently so that individual servers are not overwhelmed by sudden fluctuations ...
Radio Interface System Planning ...
This broadly applicable book introduces radio system planning, emphasizing theoretical and practical details for the planning of GSM, GPRS and UMTS mo ...
Network Troubleshooting Tools
Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones ...
Designing Large Scale Lans
This unique book outlines the advantages of a top-down, vendor-neutral approach to network design. Everything from network reliability, network topolo ...
Mobile Radio Networks, 2nd Edit ...
This book offers a comprehensive and detailed description of services and protocols of the systems. Particular attention is paid to the radio-related ...
Mobile Communication Systems
Mobile communication systems have become one of the hottest areas in the field of telecommunications and it is predicted that within the next decade a ...
HTTP: The Definitive Guide
Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) – the language of web browsers and servers, of portals and search engines, of ...
Hardening Cisco Routers
This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The ...