![The Basics of Cyber Safety](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105914/basics_cyber_safety-400x200.jpg)
Review: The Basics of Cyber Safety
About the authors John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in …
![O'Reilly DevOpsSec](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111936/oreilly-devopssec-400x200.jpg)
Review: DevOpsSec
About the author Jim Bird, CTO of a major US-based institutional alternative trading system, has more than 20 years of experience in financial services technology, including …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194835/iot-400x200.png)
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195431/keyboard-400x200.jpg)
Next Generation Red Teaming
Author: Henry DalzielPages: 46Publisher: SyngressISBN: 0128041714 Introduction Do you know the difference between penetration testing and red teaming? This book will explain …
Internet of Things: Security misconceptions, expectations, and the future
Nitesh Dhanjani is a well-known security researcher, writer, and speaker. He is currently Executive Director, Cybersecurity, at Ernst & Young, where he advises C-suite …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Cloud Storage Security, A Practical Guide
Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …
![raspberry pi](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194827/raspberrypi-400x200.png)
Penetration Testing With Raspberry Pi
Authors: Joseph Muniz, Aamir LakhaniPages: 142 pagesPublisher: Packt PublishingISBN: 1784396435 Introduction Raspberry Pi is a small and portable single board computer that …
![Build A Security Culture](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194823/book-security_culture-400x200.jpg)
Review: Build A Security Culture
Author: Kai Roer Pages: 124 Publisher: IT Governance Publishing ISBN: 1849287163 Introduction Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded …
![analytics](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194820/analytics-400x200.jpg)
Information Security Analytics
Authors: Mark Talabis, Robert McPherson, I. Miyamoto, Jason Martin Pages: 182 Publisher: Syngress ISBN: 0128002077 Introduction We’ve all heard about Big Data and …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194817/email-1-400x200.jpg)
Detecting and Combating Malicious Email
Authors: Julie JCH Ryan and Cade Kamachi Pages: 94 Publisher: Syngress ISBN: 0128001100 Introduction After years and years of security professionals explaining the dangers of …
![python](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194815/python-400x200.png)
Python Forensics
Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD