Please turn on your JavaScript for this page to function normally.
Computer Incident Response and Forensics Team Management

In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers. Having an internal security incident response …

Penetration Testing: A Hands-On Introduction to Hacking

There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start. This …

Professional Penetration Testing, Second Edition

Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …

Network Security Through Data Analysis

One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …

Thinking with Data: How to Turn Information into Insights

With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover …

Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001

A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the …

Investigating Internet Crimes

Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …

Social Media Security

I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network …

New book on implementing business continuity according to ISO 22301

“Becoming Resilient: The Definitive Guide to ISO 22301 Implementation” describes the process of implementing business continuity according to ISO 22301, an …

Unified Communications Forensics

“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …

Free eBook: 9 Steps to Cybersecurity

9 Steps to Cybersecurity from expert Dejan Kosutic is a free e-book designed specifically to take you through cybersecurity basics. Aimed at people with limited prior …

The Circle

The book talks about a near future where the most significant company in the world is The Circle. They don't deal in goods, but in what we all know is the real commodity of …

Don't miss

Cybersecurity news