Security for Microsoft Windows System Administrators
Security for Microsoft Windows System Administrators aims at teaching the reader the very basics of information security: general concepts, some cryptography, concepts and …
Computer Incident Response and Product Security
As time passes, more and more companies realize the importance of having an in-house incident response team. But how to go about forming one and organizing its functioning? …
Cisco CCENT Mind Share Game
The Cisco CCENT Mind Share Game covers key networking topics and is designed to test the players' technical knowledge and their ability to concentrate and perform under …
Acunetix Web Vulnerability Scanner 7
A manual search for vulnerabilities would simply take too much time, so penetration testers usually use an automated web vulnerability scanner to do the preliminary work for …
Securing the Smart Grid: Next Generation Power Grid Security
Smart grids are a reality and the future, and they promise greater reliability, affordability, efficiency and, hopefully, a better and environmentally cleaner exploitation of …
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking is not your typical "hacking" book. By comparing hackers with ninjas, the authors try to demonstrate how the ninja way of doing things can be translated to fit …
Seven Deadliest Network Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at networks: DoS, MiTM, war dialing, penetration …
Dissecting the Hack: The F0rb1dd3n Network (Revised Edition)
This book approaches the subject of hacking in an interesting way. Part fiction, part reference manual, its target audience are people who want to or should know more about …
Seven Deadliest Microsoft Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at Microsoft's networks and software: Windows, SQL and …
CISSP Study Guide
The title of the book is self-explanatory - this is a study guide for all of you out there who aspire to become a Certified Information Systems Security Professional. …
Seven Deadliest Wireless Technologies Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at wireless technologies and devices that use …
Virtualization for Security
Virtualization is among the hottest topics in the IT world today. While the term itself can mean many different things in IT, most of the time it actually refers to so-called …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)