Please turn on your JavaScript for this page to function normally.
The Computer Incident Response Planning Handbook

The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …

Safe C++: How to avoid common mistakes

It’s easy to make lots of programming mistakes in C++. In fact, any program over a few hundred lines is likely to contain bugs. With this book, you’ll learn about …

Seven Databases in Seven Weeks

For years, the popularity of relational databases created by Oracle, Microsoft, and IBM, and of the open source MySQL, PostgreSQL, and SQLite was undisputed. But, in time, …

Hadoop: The Definitive Guide, 3rd Edition

Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …

Introducing Windows Server 2012

Windows Server 2012, currently available as a Release Candidate, brings forward hundreds of new features and enhancements including cloud computing, networking, storage, …

Hacking Exposed 7: Network Security Secrets and Solutions

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The 7th …

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …

CompTIA Security+ Rapid Review

Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …

Think Like a Programmer

The real challenge of programming isn’t learning a language’s syntax—it’s learning to creatively solve problems so you can build something great. In this …

Understanding IPv6, 3rd Edition

Get in-depth technical information to put IPv6 technology to work—including networks with hardware running Windows 8 and Windows Server 2012. Written by a networking expert, …

Mastering Windows Network Forensics and Investigation

Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book …

Microsoft SQL Server 2012 T-SQL Fundamentals

Get started with the fundamentals of Transact-SQL and learn how to write efficient and powerful database queries. With this hands-on guide, you’ll gain a solid …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools