Free mobile security eBook from Veracode
Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …
Programming Microsoft’s Clouds: Windows Azure and Office 365
This book offers an in-depth look at a wide range of cloud topics. It explains how companies can easily scale their cloud use up and down to fit their business requirements. …
Windows Forensic Analysis Toolkit, Third Edition
As a considerable number of PC users has switched to Windows 7, Harlan Carvey has updated its popular Windows Forensic Analysis Toolkit book to cover the systems running it. …
Security Metrics, A Beginner’s Guide
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …
Web Application Security, A Beginner’s Guide
Web Application Security, A Beginner’s Guide imparts the hard-learned lessons and experiences of top security professionals, and provides know-how that can otherwise …
Information Storage and Management
Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …
Wireless Network Security A Beginner’s Guide
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner’s Guide discusses the many attack vectors …
Securing the Cloud
Cloud computing and cloud services have proliferated in the first place because of one simple reason: they lower the cost of doing business. The worrying about the security …
Advanced Internet Protocols, Services, and Applications
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions …
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current …
How digital economy is changing the world
Unzipping the Digital World is a new book by Keith Willetts that captures a lifetime of his experience in the communications and software world and gives an eye-opening view …
High Performance MySQL
High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …
Featured news
Resources
Don't miss
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams