Hacking Web Apps
Web security impacts applications, servers and browsers. Successful attacks against Web applications and sites means bad news for their owners, developers and users. This book …
Nmap 6: Network exploration and security auditing cookbook
Nmap 6: Network exploration and security auditing cookbook will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of …
Windows 8 Hacks
Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With Windows 8 Hacks, you’ll learn how to make a variety …
CompTIA A+ Complete Lab Manual
Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given …
Virtualization Security: Protecting Virtualized Environments
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …
Windows Server 2012: Up and Running
If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows …
Free ebook identifies easy to manage network security vulnerabilities
nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …
Free ebook: Introducing Windows 8
Get a headstart evaluating Window 8—guided by a Windows expert who’s worked extensively with the software since the preview releases. Based on final, …
Mac OS X and iOS Internals
Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …
Information Overload
Written and edited by an international group of experts from academia and industry, Information Overload clearly links academic theory to real-world practice, providing a …
Trojan Horse: A Novel
It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …
Effective MySQL: Replication Techniques in Depth
Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …
Featured news
Resources
Don't miss
- Millions of Android devices roped into Badbox 2.0 botnet. Is yours among them?
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems