Security Intelligence
Python Hacking Essentials
A Practical Guide to TPM 2.0
Enterprise Cybersecurity
Instant Kali Linux
Protect Your Privacy
Accumulo
Spring Security 3
GlassFish Security
Instant Penetration Testing
Microsoft Dynamics AX 2012 R3 S ...
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakehold ...
Security Planning: An Applied A ...
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan ...
Distributed Networks: Intellige ...
For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized comm ...
Security Intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through ...
Python Hacking Essentials
This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Her ...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows secur ...
The Antivirus Hacker’s Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker’s Handbook guides you through the process of reverse engineering ...
The Hacker Playbook 2: Practica ...
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be un ...
Windows Malware Analysis Essent ...
Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. ...
Cyber Security: Analytics, Tech ...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation ...
Enterprise Cybersecurity
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating t ...
Official (ISC)2 Guide to the CS ...
The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (IS ...
Instant Kali Linux
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to m ...
Visual Cryptography and Secret ...
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Conside ...
Hacking: Basic Security, Penetr ...
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking ...
Protect Your Privacy
Have you ever thought about your security online? Do you ever wonder how you can stay safe on the web? If your answers to these questions were both “y ...
Accumulo
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
Essential Cybersecurity Science
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to ap ...
Instant Penetration Testing
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. ...
Immune Web: What makes the Inte ...
A personalized Internet Guide to protect your from everything unsafe on 21st century Web. Covering dozens of topic from simple passwords to complex da ...
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Metasploit Penetration Testing ...
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...
Learning Metasploit Exploitatio ...
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. ...