Please turn on your JavaScript for this page to function normally.
Hack This: 24 Incredible Hackerspace Projects from the DIY Movement

Hack This is your passport to the world of hackerspaces: your invitation to share knowledge, master tools, work together and build amazing stuff. Twin Cities Maker co-founder …

Network Forensics: Tracking Hackers Through Cyberspace

Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from …

VMware Cookbook, 2nd Edition

With scores of step-by-step solutions, VMware Cookbook, 2nd Edition helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the …

Predicting Malicious Behavior

Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …

Free mobile security eBook from Veracode

Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …

Programming Microsoft’s Clouds: Windows Azure and Office 365

This book offers an in-depth look at a wide range of cloud topics. It explains how companies can easily scale their cloud use up and down to fit their business requirements. …

Windows Forensic Analysis Toolkit, Third Edition

As a considerable number of PC users has switched to Windows 7, Harlan Carvey has updated its popular Windows Forensic Analysis Toolkit book to cover the systems running it. …

Security Metrics, A Beginner’s Guide

Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …

Web Application Security, A Beginner’s Guide

Web Application Security, A Beginner’s Guide imparts the hard-learned lessons and experiences of top security professionals, and provides know-how that can otherwise …

Information Storage and Management

Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …

Wireless Network Security A Beginner’s Guide

Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner’s Guide discusses the many attack vectors …

Securing the Cloud

Cloud computing and cloud services have proliferated in the first place because of one simple reason: they lower the cost of doing business. The worrying about the security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools