
Bulletproof SSL and TLS
Deploying SSL or TLS in a secure way is a great challenge for system administrators. This book aims to simplify that challenge by offering extensive knowledge and good advice …

Inside the ISO 27001 Documentation Toolkit
You work for a small or medium company and you'd like to become compliant, but budget is always an issue. The ISO 27001 Documentation Toolkit from 27001 Academy is here to …
Social Engineering Penetration Testing
We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …
Targeted Cyber Attacks
Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe. This book aims to tell you how …
Computer Incident Response and Forensics Team Management
In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers. Having an internal security incident response …
Penetration Testing: A Hands-On Introduction to Hacking
There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start. This …
Web application penetration testing with ImmuniWeb
Switzerland-based ethical hacking and penetration testing experts High-Tech Bridge recently released an interesting security product that uses a hybrid approach towards web …
Secure public WiFi with avast! SecureLine for iOS
While constant Internet connectivity can be useful, it does create many privacy and security issues whose existence remains a mystery for the majority of mobile users. If you …
Thecus N5550 NAS Server inside and out
Having a backup drive has become essential. Those serious about their storage needs turn to NAS devices. Like most tech available today, those range from introductory models …
Professional Penetration Testing, Second Edition
Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …
Network Security Through Data Analysis
One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …
Featured news
Resources
Don't miss
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)
- Phishers are increasingly impersonating electronic toll collection companies
- 7 ways to get C-suite buy-in on that new cybersecurity tool
- Building a cybersecurity strategy that survives disruption
- Open-source malware doubles, data exfiltration attacks dominate