CompTIA CySA+ Practice Tests
Practical Malware Analysis
Network Forensics
The IDA Pro Book
Hackers
امنیت بیشتر با پروتکل SSL
Beautiful Security
Cloud Security and Privacy
BackTrack 5 Cookbook
Learn to perform penetration tests with BackTrack 5. Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTr ...
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...
Managing Risk and Information S ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...
Metasploit Penetration Testing ...
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...
CompTIA CySA+ Practice Tests
Some copies of CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876) were printed without discount exam vouchers in the front of the books. If y ...
Practical Malware Analysis
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current ...
تعیین تاریخ انقضا برای رمز عبور ح ...
تعیین تاریخ انقضا برای رمز عبور حساب های کاربری در ویندوز XP همانطور که می دانید هر کاربر در ویندوز XP می تواند برای حساب کاربری خود رمزعبور تعیین کن ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Network Forensics
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional ...
Gray Hat Hacking, 3rd Edition
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on ...
Firewalls Don’t Stop Dragons, 3 ...
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what y ...
آشنایی با حملات مرد میانی MitM at ...
آشنایی با حملات مرد میانی MitM attack حملهٔ مرد میانی (اغلب با مخفف MITM و همچنین با عنوان حمله ی bucket brigade یا گاهی اوقات با عنوان حمله ی ژانوس ...
The IDA Pro Book
No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the mi ...
تجزیه و تحلیل امنیت
Security analysis
بنجامین گراهام (انگلیسی: Benjamin Graham؛ ۹ مهٔ ۱۸۹۴(1894-05-09) – ۲۱ سپتامبر ۱۹۷۶(1976-09-21)) یک اقتصاددان اهل ایالات متحده آمریکا بود.
Testing and Securing Android St ...
Today, mobile applications are increasingly being used to access the Web. Mobile developers play a key role in how consumers access the Web with milli ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
Hackers
Steven Levy’s classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated ...
امنیت بیشتر با پروتکل SSL
امنیت بیشتر با پروتکل SSL پروتکل SSL برای اولین بار توسط شرکت Netscape به منظور انتقال اطلاعات به صورت امن بین دو نقطه در اینترنت تهیه شد و سپس توسط ...
Windows Malware Analysis Essent ...
Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. ...
Hacking Exposed Web Application ...
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security ...
Network Attacks and Defenses: A ...
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attac ...
Hacking Exposed Wireless, 2nd E ...
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover ...
Protecting Your Mobile App IP: ...
Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t s ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...