Cracking Codes with Python
Personal Cybersecurity
BeagleBone for Secret Agents
Mastering Mobile Forensics
Database Nation
Crackproof Your Software
Computer Viruses For Dummies
Network Security Bible
PGP & GPG
Security Power Tools
Security Metrics
Asset Attack Vectors
Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are d ...
Intelligence-Driven Incident Re ...
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they ...
Open Source Intelligence Method ...
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your in ...
Cracking Codes with Python
Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python pr ...
Pro iOS Security and Forensics
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vul ...
CompTIA Security+: Get Certifie ...
The CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 study guides, which have helped ...
Firewalls Don’t Stop Dragons, 3 ...
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what y ...
Hardware IP Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP c ...
Personal Cybersecurity
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practic ...
BeagleBone for Secret Agents
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologi ...
Mastering Mobile Forensics
Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide ...
Practical Internet of Things Se ...
With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes ...
Hacking For Dummies, 3rd Editio ...
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It’s bad enough when a hack occurs-stealing iden ...
Applied Cryptography, 2nd Editi ...
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and ele ...
Database Nation
As the 21st century begins, advances in technology endanger our privacy in ways never before imagined. This newly revised update of the popular hardco ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide ava ...
Crackproof Your Software
This essential resource for software developers highlights the weak points in “well-protected” software, shows how crackers break common protection sc ...
Computer Viruses For Dummies
Computer viruses – just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in com ...
Network Security Bible
* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of sec ...
PGP & GPG
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimme ...
Network Security Hacks, 2nd Edi ...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network ...
Disassembling Code: IDA Pro and ...
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize di ...
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security P ...
Security Metrics
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample ...