Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
CompTIA Security+ Rapid Review
Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …
Think Like a Programmer
The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …
Understanding IPv6, 3rd Edition
Get in-depth technical information to put IPv6 technology to work—including networks with hardware running Windows 8 and Windows Server 2012. Written by a networking expert, …
Mastering Windows Network Forensics and Investigation
Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book …
Microsoft SQL Server 2012 T-SQL Fundamentals
Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you’ll gain a solid …
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement
Hack This is your passport to the world of hackerspaces: your invitation to share knowledge, master tools, work together and build amazing stuff. Twin Cities Maker co-founder …
Network Forensics: Tracking Hackers Through Cyberspace
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …
VMware Cookbook, 2nd Edition
With scores of step-by-step solutions, VMware Cookbook, 2nd Edition helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the …
Predicting Malicious Behavior
Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …
Free mobile security eBook from Veracode
Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …
Programming Microsoft’s Clouds: Windows Azure and Office 365
This book offers an in-depth look at a wide range of cloud topics. It explains how companies can easily scale their cloud use up and down to fit their business requirements. …