Please turn on your JavaScript for this page to function normally.
CompTIA Security+ SY0-301 Authorized Cert Guide, 2nd Edition

Learn, prepare, and practice for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT Certification …

The CERT Guide to Insider Threats

Since 2001, the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than …

Low Tech Hacking: Street Smarts for Security Professionals

When talking about hacking, many of us primarily think about software vulnerabilities, exploits, malware and coding. But as social engineering began to grab headlines, the …

The Internet of Things: Key Applications and Protocols

The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …

Practical Malware Analysis

Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …

Microsoft Windows Operating System Essentials

Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …

Inside Cyber Warfare, 2nd Edition

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare – without truly realizing the scope …

Making Embedded Systems

Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …

Building Resilient IP Networks

More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …

Planning for IPv6

With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …

Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what …

Network Warrior, 2nd Edition

If you are interested in knowing everything that you can possibly know about networking, chances are you were already urged to read Gary Donahue's Network Warrior. Four years …

Don't miss

Cybersecurity news