Securing the Cloud
Cloud computing and cloud services have proliferated in the first place because of one simple reason: they lower the cost of doing business. The worrying about the security …
LOK-IT Secure Flash Drive
After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …
Digital Forensics with Open Source Tools
Proprietary digital forensics tools have long been popular with the majority of forensic practitioners, but there are also open source ones that can come very handy. The book …
CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cram (3rd Edition)
The title says it all - with over 800 practice questions, this book covers all the topics addressed in the CompTIA Security+ SY0-301 exam, and the CD allows you to experience …
Metasploit: The Penetration Tester’s Guide
Metasploit Framework (MF), the open source tool for launching exploits against remote machines, is a well-loved instrument that allows penetration testers to automate routine …
The Basics of Digital Forensics
Computers, mobile devices and the Internet have become an integral part of our daily lives. They are helpful tools, but they are also sources of information that one would not …
Low Tech Hacking: Street Smarts for Security Professionals
When talking about hacking, many of us primarily think about software vulnerabilities, exploits, malware and coding. But as social engineering began to grab headlines, the …
Network Warrior, 2nd Edition
If you are interested in knowing everything that you can possibly know about networking, chances are you were already urged to read Gary Donahue's Network Warrior. Four years …
Preventing Good People From Doing Bad Things
As the number of known security breaches seemingly rises exponentially with every passing day, business managers and the general public are becoming increasingly aware of a …
BackTrack 5 Wireless Penetration Testing
If you're considering a career in penetration testing, you probably already know that BackTrack is the Linux distribution favored by most pentesters due to it being preloaded …
A Bug Hunter’s Diary
For individuals who make a living developing and maintaining software systems, finding bugs in their own code is almost a daily ritual. Working on software developing projects …
The Basics of Hacking and Penetration Testing
Have you always wondered about how penetration testing is performed, but never had the opportunity to ask a professional about it or to witness him (or her) at work? If that's …