Security

Computer Hacking: The Essential Hacking Guide for Beginners (hacking for dummies, hacking books, hacking guide, how to hack, hacking free guide) (Volume 1)

Computer Hacking: The Essential Hacking Guide for Beginners (hacking for dummies, hacking books, hacking guide, how to hack, hacking free guide) (Volume 1)

Computer Hacking The Essential Hacking Guide for Beginners Have you ever wanted to learn more about hacking? Have you wanted to understand the secrets of the hacking community, or understand some of the key techniques used by hackers? Have you wondered about the motivations of hackers, or been intrigued by how people are still targeted by … Read More »

Network Security Assessment, 2nd Edition

Network Security Assessment, 2nd Edition

Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and… Read More »

Beautiful Security

Beautiful Security

In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems in the face of ever-increasing threats. You’ll learn how new and more aggressive security measures work — and where they will lead us. This far-reaching discussion takes you in… Read More »

Information Security The Complete Reference, 2nd Edition

Information Security The Complete Reference, 2nd Edition

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, 2nd Edition is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving … Read More »

Learning Pentesting for Android Devices

Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the a… Read More »

Data Analysis For Network Cyber-Security

Data Analysis For Network Cyber-Security

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intentio… Read More »

Visual Cryptography and Secret Image Sharing

Visual Cryptography and Secret Image Sharing

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods… Read More »

SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide

SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide

Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focusing on the Common Body of Knowledge (CBK) as determined by ISC2 in seven high level topics. This Sybex Study Guide covers 100% of all exam objectives. You’ll prepare for the exam smarte… Read More »

iOS Application Security

iOS Application Security

Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them. After a crash course on iOS application stru… Read More »

Social Security For Dummies, 3rd Edition

Social Security For Dummies, 3rd Edition

Make sure you get the benefits you’ve earned Navigate your way around the complex system with ease Incorporate Social Security into your financial plan Your Social Security safety net Social Security exists to give us peace of mind, yet most of us spend sleepless nights anxious about our finances as we move on to the next phase o… Read More »

The IoT Hacker’s Handbook

The IoT Hacker’s Handbook

Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture’s central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You’ll also learn to assess a device p… Read More »

Applied Cryptography, 2nd Edition

Applied Cryptography, 2nd Edition

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography alg… Read More »

Hacking Exposed Windows, 3rd Edition

Hacking Exposed Windows, 3rd Edition

Meet the challenges of Windows security with the exclusive Hacking Exposed “attack-countermeasure” approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and … Read More »

Protecting Your Mobile App IP: The Mini Missing Manual

Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do happen, you’ll have the legal ammunition you need to re… Read More »


Request IT ebooks HERE!!!