Information Storage and Management
Information Storage and Management covers the components of a storage system and the different storage system models while also offering essential new material that explores …
Wireless Network Security A Beginner’s Guide
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner’s Guide discusses the many attack vectors …
Securing the Cloud
Cloud computing and cloud services have proliferated in the first place because of one simple reason: they lower the cost of doing business. The worrying about the security …
Advanced Internet Protocols, Services, and Applications
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions …
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current …
How digital economy is changing the world
Unzipping the Digital World is a new book by Keith Willetts that captures a lifetime of his experience in the communications and software world and gives an eye-opening view …
High Performance MySQL
High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …
Inside Windows Debugging
Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …
Getting started with RFID
If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the …
Android Cookbook
“Android has gone from zero to one of the leading mobile platforms in a few years,” explains author Ian Darwin, who crowdsourced many of the 200 …
Windows Internals, Part 1, Sixth Edition
Delve inside Windows architecture and internals – and see how core components work behind the scenes. Led by three renowned internals experts, this classic guide is …
Digital Forensics with Open Source Tools
Proprietary digital forensics tools have long been popular with the majority of forensic practitioners, but there are also open source ones that can come very handy. The book …
Featured news
Resources
Don't miss
- How global collaboration is hitting cybercriminals where it hurts
- Vet: Open-source software supply chain security tool
- Bankers Association’s attack on cybersecurity transparency
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac