Free guide to identity theft prevention
Intersections released the second edition of the Double Trouble ebook, that serves as a guide to identity theft prevention, including real-world scenarios where identity theft …
Moving To The Cloud
Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors …
Digital Triage Forensics
Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield …
BackTrack 5 Wireless Penetration Testing Beginner’s Guide
Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of …
Windows 7 Inside Out
Windows 7 Inside Out, Deluxe Edition is updated with 300+ new pages of information for working with Windows 7. This comprehensive reference to Windows 7 packs hundreds of …
The Basics of Information Security
As part of the Syngress Basics series, The Basics of Information Security will provide the reader with fundamental knowledge of information security in both theoretical and …
Coding for Penetration Testers
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etc. If a penetration tester …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
Digital Forensics for Legal Professionals
Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors’ years of experience in working with …
Windows Sysinternals Administrator’s Reference
Get an edge on Windows diagnostics and support – direct from the Sysinternals experts at Microsoft. The Windows Sysinternals tools, available for download from Microsoft …
Penetration Tester’s Open Source Toolkit
Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open …
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …
Featured news
Resources
Don't miss
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams