Packet Guide to Routing and Switching
Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. …
The Basics of Digital Forensics
Computers, mobile devices and the Internet have become an integral part of our daily lives. They are helpful tools, but they are also sources of information that one would not …
Machine Learning for Hackers
If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …
iOS 5 Programming Cookbook
Now you can overcome the vexing, real-life issues you confront when creating apps for the iPhone, iPad, or iPod Touch. By making use of more than 100 new recipes in this …
CompTIA Network+ Lab Manual
Think of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + …
Programming Perl, 4th Edition
Adopted as the undisputed Perl bible soon after the first edition appeared in 1991, Programming Perl is still the go-to guide for this highly practical language. Perl began …
CompTIA Security+ SY0-301 Authorized Cert Guide, 2nd Edition
Learn, prepare, and practice for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT Certification …
The CERT Guide to Insider Threats
Since 2001, the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than …
Low Tech Hacking: Street Smarts for Security Professionals
When talking about hacking, many of us primarily think about software vulnerabilities, exploits, malware and coding. But as social engineering began to grab headlines, the …
The Internet of Things: Key Applications and Protocols
The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …
Practical Malware Analysis
Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …
Microsoft Windows Operating System Essentials
Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …
Featured news
Resources
Don't miss
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies