Advanced Internet Protocols, Services, and Applications
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions …
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current …
How digital economy is changing the world
Unzipping the Digital World is a new book by Keith Willetts that captures a lifetime of his experience in the communications and software world and gives an eye-opening view …
High Performance MySQL
High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL’s full power. Learn how to design schemas, indexes, queries, and advanced …
Inside Windows Debugging
Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …
Getting started with RFID
If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the …
Android Cookbook
“Android has gone from zero to one of the leading mobile platforms in a few years,” explains author Ian Darwin, who crowdsourced many of the 200 …
Windows Internals, Part 1, Sixth Edition
Delve inside Windows architecture and internals – and see how core components work behind the scenes. Led by three renowned internals experts, this classic guide is …
Digital Forensics with Open Source Tools
Proprietary digital forensics tools have long been popular with the majority of forensic practitioners, but there are also open source ones that can come very handy. The book …
Webbots, Spiders, and Screen Scrapers, 2nd Edition
There’s a wealth of data online, but sorting and gathering it by hand can be tedious and time consuming. Rather than click through page after endless page, why not let …
Theory of Computation
Offering an accessible approach to the topic, Theory of Computation focuses on the metatheory of computing and the theoretical boundaries between what various computational …
Security and Privacy for Microsoft Office 2010 Users
Take control and put the built-in security and privacy features in Microsoft Office to work. Whether downloading documents, publishing a presentation, or collaborating online …
Featured news
Resources
Don't miss
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies