Hacking Point of Sale
Data-Driven Security
Cybersecurity for Executives
Cyber Threat!
Black Hat Python
Android Security Internals
Android Hacker’s Handbook
Advanced API Security
Cyberspace and Cybersecurity
Bitcoin for the Befuddled
Transnational Security
Mastering Metasploit
The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on variou ...
Learning Pentesting for Android ...
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are pu ...
Learning Nessus for Penetration ...
IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed secur ...
Kali Linux Network Scanning Coo ...
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of ne ...
Hacking Point of Sale
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
Cybersecurity for Executives
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, i ...
Cyber Threat!
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of go ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Building Virtual Pentesting Lab ...
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...
Black Hat Python
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the mag ...
Anti-Hacker Tool Kit, 4th Editi ...
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Android Hacker’s Handbook
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by expe ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
Network Attacks and Defenses: A ...
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attac ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
Engineering Secure Software and ...
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Mila ...
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
Official (ISC)2 Guide to the CI ...
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was develope ...
Cyberspace and Cybersecurity
English | ISBN: 1466501332 | 2012 | 236 pages | PDF | 2 MBBased on relate Based on related courses and research on the cyber environment in Europe, th ...
Bitcoin for the Befuddled
Unless you’ve been living under a rock for the last couple of years, you’ve probably heard of Bitcoin-the game-changing digital currency used by milli ...
Wireshark Network Analysis, 2nd ...
Wireshark is the world’s most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
Computer Forensics JumpStart, 2 ...
Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...