Hacking Exposed Mobile
Cuckoo Malware Analysis
What Is Computer Science?
Threat Modeling
The InfoSec Handbook
The Art of Memory Forensics
Penetration Testing
Mastering Metasploit
Hacking Point of Sale
Data-Driven Security
Cybersecurity for Executives
Cyber Threat!
Hacking For Dummies, 4th Editio ...
The best way to stay safe online is to stop hackers before they attack – first, by understanding their thinking and second, by ethically hacking your ...
Hacking Exposed Mobile
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in ...
Cuckoo Malware Analysis
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of ...
Computer Security – ESORICS 201 ...
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013 ...
What Is Computer Science?
This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative concepts br ...
Threat Modeling
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the ...
The Manager’s Guide to Web Appl ...
The Manager’s Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written ...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field an ...
The Hacker Playbook: Practical ...
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be un ...
The Browser Hacker’s Handbook
The Browser Hacker’s Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attack ...
The Art of Memory Forensics
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst’s Cookbook, ...
Practical Reverse Engineering
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design document ...
Penetration Testing with the Ba ...
This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level securit ...
Penetration Testing with BackBo ...
BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been de ...
Penetration Testing
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts ...
Mastering Metasploit
The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on variou ...
Learning Pentesting for Android ...
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are pu ...
Learning Nessus for Penetration ...
IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed secur ...
Kali Linux Network Scanning Coo ...
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of ne ...
Hacking Point of Sale
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
Cybersecurity for Executives
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, i ...
Cyber Threat!
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of go ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Building Virtual Pentesting Lab ...
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...