CISSP Rapid Review
Assess your readiness for the CISSP Exam—and quickly identify where you need to focus and practice. CISSP Rapid Review is a practical and streamlined guide which provides …
Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality is not the stuff of science fiction any more, and we should all be at least familiar with its current and likely future uses. This book aims to be an …
Designing and Implementing a Server Infrastructure
Prepare for Exam 70-413 and help demonstrate your real-world mastery of enterprise server design and implementation. Designed for experienced, MCSA-certified professionals …
Mac Kung Fu, 2nd Edition: Tips, Tricks, Hints, and Hacks
Get over 400 quick and easy tips, tricks, hints and hacks in Mac Kung Fu, Second Edition. Exploit secret settings and hidden apps, push built-in tools to the limit, radically …
Training Guide: Installing and Configuring Windows Server 2012
Designed to help enterprise administrators develop real-world, job-role-specific skills, this Training Guide focuses on deploying and managing core infrastructure services in …
Hacking Web Apps
Web security impacts applications, servers and browsers. Successful attacks against Web applications and sites means bad news for their owners, developers and users. This book …
Nmap 6: Network exploration and security auditing cookbook
Nmap 6: Network exploration and security auditing cookbook will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of …
Windows 8 Hacks
Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With Windows 8 Hacks, you’ll learn how to make a variety …
CompTIA A+ Complete Lab Manual
Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given …
Virtualization Security: Protecting Virtualized Environments
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …
Windows Server 2012: Up and Running
If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows …
Free ebook identifies easy to manage network security vulnerabilities
nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …
Featured news
Resources
Don't miss
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams