Security Monitoring
Practical Intrusion Analysis
Hacking Exposed, 6th Edition
Fragile networks
Cloud Security and Privacy
Beautiful Security
Hackers
The IDA Pro Book
Practical Malware Analysis
BackTrack 5 Cookbook
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
Practical Intrusion Analysis
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. ...
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following t ...
Hacking Exposed Malware and Roo ...
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the “black art” of malware and rootkits. You wi ...
Hacking Exposed Computer Forens ...
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, ...
Fragile networks
A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions Frag ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Protecting Your Mobile App IP: ...
Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t s ...
Hacking Exposed Wireless, 2nd E ...
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover ...
Hacking Exposed Web Application ...
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security ...
Hackers
Steven Levy’s classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
The IDA Pro Book
No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the mi ...
Gray Hat Hacking, 3rd Edition
This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Practical Malware Analysis
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current ...
Metasploit Penetration Testing ...
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security ...
Managing Risk and Information S ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...
BackTrack 5 Cookbook
Learn to perform penetration tests with BackTrack 5. Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTr ...
Advanced Penetration Testing fo ...
Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environm ...
Web Penetration Testing with Ka ...
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source p ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...