Practical Malware Analysis
The IDA Pro Book
Hackers
Beautiful Security
Cloud Security and Privacy
Fragile networks
Hacking Exposed, 6th Edition
Practical Intrusion Analysis
Security Monitoring
The Myths of Security
Hacking VoIP
Hacking, 2nd Edition
BackTrack 5 Cookbook
Learn to perform penetration tests with BackTrack 5. Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTr ...
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...
Managing Risk and Information S ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...
Metasploit Penetration Testing ...
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...
Practical Malware Analysis
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Gray Hat Hacking, 3rd Edition
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on ...
The IDA Pro Book
No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the mi ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
Hackers
Steven Levy’s classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated ...
Hacking Exposed Web Application ...
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security ...
Hacking Exposed Wireless, 2nd E ...
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover ...
Protecting Your Mobile App IP: ...
Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t s ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Fragile networks
A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions Frag ...
Hacking Exposed Computer Forens ...
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, ...
Hacking Exposed Malware and Roo ...
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the “black art” of malware and rootkits. You wi ...
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following t ...
Practical Intrusion Analysis
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. ...
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Hacking Exposed Linux, 3rd Edit ...
This authoritative guide will help you secure your Linux network – whether you use Linux as a desktop OS, for Internet services, for telecommunication ...
Hacking VoIP
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet a ...
Hacking, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl ...