Hacking Exposed Web 2.0
Rootkits For Dummies
Securing Ajax Applications
Securing VoIP Networks
Security Metrics
Security Power Tools
PGP & GPG
Network Security Bible
Computer Viruses For Dummies
Crackproof Your Software
Database Nation
Mastering Mobile Forensics
BeagleBone for Secret Agents
Personal Cybersecurity
Reverse Engineering Code with I ...
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. H ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
Hacking Exposed Web 2.0
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
Rootkits For Dummies
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system’s ...
Securing Ajax Applications
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed r ...
Securing VoIP Networks
In Securing VoIP Networks,two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer pro ...
Security Metrics
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample ...
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security P ...
Disassembling Code: IDA Pro and ...
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize di ...
Network Security Hacks, 2nd Edi ...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network ...
PGP & GPG
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimme ...
Network Security Bible
* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of sec ...
Computer Viruses For Dummies
Computer viruses – just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in com ...
Crackproof Your Software
This essential resource for software developers highlights the weak points in “well-protected” software, shows how crackers break common protection sc ...
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide ava ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...
Database Nation
As the 21st century begins, advances in technology endanger our privacy in ways never before imagined. This newly revised update of the popular hardco ...
Applied Cryptography, 2nd Editi ...
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and ele ...
Hacking For Dummies, 3rd Editio ...
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It’s bad enough when a hack occurs-stealing iden ...
Practical Internet of Things Se ...
With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes ...
Mastering Mobile Forensics
Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide ...
BeagleBone for Secret Agents
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologi ...
Personal Cybersecurity
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practic ...
Hardware IP Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP c ...