Bitcoin Essentials
BeagleBone for Secret Agents
Hacking Vim 7.2
Instant Penetration Testing
GlassFish Security
Spring Security 3
Accumulo
Protect Your Privacy
Instant Kali Linux
Enterprise Cybersecurity
The Architecture of Privacy
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new ...
Big Data Forensics – Learning H ...
Big Data forensics is an important type of digital investigation that involves the identification, collection, and analysis of large-scale Big Data sy ...
IBM WebSphere Application Serve ...
For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overvie ...
Bitcoin Essentials
Blockchain is being billed as the technology of the future. Bitcoin is the first application of that technology. Mining is what makes it all possible. ...
Hacking For Dummies, 5th Editio ...
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! “Hacking ...
BeagleBone for Secret Agents
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologi ...
Hacking Vim 7.2
This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapte ...
Learning Metasploit Exploitatio ...
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. ...
Metasploit Penetration Testing ...
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Immune Web: What makes the Inte ...
A personalized Internet Guide to protect your from everything unsafe on 21st century Web. Covering dozens of topic from simple passwords to complex da ...
Instant Penetration Testing
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. ...
Essential Cybersecurity Science
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to ap ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
Accumulo
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s ...
Protect Your Privacy
Have you ever thought about your security online? Do you ever wonder how you can stay safe on the web? If your answers to these questions were both “y ...
Hacking: Basic Security, Penetr ...
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking ...
Visual Cryptography and Secret ...
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Conside ...
Instant Kali Linux
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to m ...
Official (ISC)2 Guide to the CS ...
The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (IS ...
Enterprise Cybersecurity
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating t ...
Cyber Security: Analytics, Tech ...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation ...
Windows Malware Analysis Essent ...
Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. ...
The Hacker Playbook 2: Practica ...
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be un ...