Please turn on your JavaScript for this page to function normally.
Hacking Web Apps

Web security impacts applications, servers and browsers. Successful attacks against Web applications and sites means bad news for their owners, developers and users. This book …

Nmap 6: Network exploration and security auditing cookbook

Nmap 6: Network exploration and security auditing cookbook will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of …

Windows 8 Hacks

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With Windows 8 Hacks, you’ll learn how to make a variety …

CompTIA A+ Complete Lab Manual

Designed to complement CompTIA A+ Complete Study Guide, this hands-on companion book takes you step by step through the tasks a PC technician is likely to face on any given …

Virtualization Security: Protecting Virtualized Environments

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and …

Windows Server 2012: Up and Running

If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows …

Free ebook identifies easy to manage network security vulnerabilities

nCircle announced the release of a new eBook entitled “Just Turn it Off” (PDF, ePub). The book identifies twelve network security vulnerabilities that are both …

Free ebook: Introducing Windows 8

Get a headstart evaluating Window 8—guided by a Windows expert who’s worked extensively with the software since the preview releases. Based on final, …

Mac OS X and iOS Internals

Powering Macs, iPhones, iPads and more, OS X and iOS are becoming ubiquitous. When it comes to documentation, however, much of them are shrouded in mystery. Cocoa and Carbon, …

Information Overload

Written and edited by an international group of experts from academia and industry, Information Overload clearly links academic theory to real-world practice, providing a …

Trojan Horse: A Novel

It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer …

Effective MySQL: Replication Techniques in Depth

Effective MySQL: Replication Techniques in Depth describes what is needed to understand and implement MySQL replication to build scalable solutions. This book includes …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools