Please turn on your JavaScript for this page to function normally.
Penetration Tester’s Open Source Toolkit

Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open …

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give …

Thor’s Microsoft Security Bible

Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …

IT control objectives for cloud computing

Cloud computing has become a major growth area in IT spending, and enterprises must adapt to the changes it brings to maximize the return on investment. To help organizations …

New book: Mac OS X Lion Pocket Guide

The Mac OS X Lion Pocket Guide is packed with concise and useful information in an easy-to-read format for users of all levels. It’s ideal for quick problem solving, and …

CCNP Security Secure 642-637 Official Cert Guide

The title of the book says it all - thick and all-encompassing, it covers the topics addressed in the exam CCNP Secure 642-637, but it should not be considered the only source …

Guide for the Secure Software Development Lifecycle

(ISC)2 released of the “Official (ISC)2 Guide to the CSSLP“, a textbook that serves as the only official guide to the Certified Secure Software Lifecycle …

Cisco Firewalls

There used to be a time when firewalls were considered a full proof solution for protecting networks, and that time is long gone. History has taught us there are no silver …

New book: Network Warrior, Second Edition

There are many books on network certification, this one tells you what to do once you’ve passed the exam and out in the real world. Network Warrior, Second Edition …

New book: Practical Packet Analysis, 2nd Edition

Wireshark, the free and open source packet analyzer, lets users capture, examine, and reassemble packets in order to troubleshoot their network problems. But once the packets …

Spam e-books plague Amazon’s Kindle store

If you are a regular customer of Amazon’s Kindle store, you could already be aware of the fact that spammers are using it to fleece customers out of their hard-earned …

Don't miss

Cybersecurity news