syngress
Moving To The Cloud
Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors …
Digital Triage Forensics
Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield …
The Basics of Information Security
As part of the Syngress Basics series, The Basics of Information Security will provide the reader with fundamental knowledge of information security in both theoretical and …
Coding for Penetration Testers
Tools used for penetration testing are often purchased off-the-shelf. Each tool is based on a programming language like Perl, JavaScript, Python, etc. If a penetration tester …
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
Digital Forensics for Legal Professionals
Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors’ years of experience in working with …
Penetration Tester’s Open Source Toolkit
Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open …
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the …
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give …
Thor’s Microsoft Security Bible
Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …
Win a copy of Practical Lock Picking!
We are giving away two copies of “Practical Lock Picking“. For the first time, Deviant Ollam, one of the security industry’s best-known lockpicking teachers, …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments