Please turn on your JavaScript for this page to function normally.
Inside Cyber Warfare, 2nd Edition

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare – without truly realizing the scope …

Making Embedded Systems

Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …

Building Resilient IP Networks

More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is …

Planning for IPv6

With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level …

Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what …

Network Warrior, 2nd Edition

If you are interested in knowing everything that you can possibly know about networking, chances are you were already urged to read Gary Donahue's Network Warrior. Four years …

Mac Kung Fu: Over 300 Tips, Tricks, Hints, and Hacks for OS X Lion

After you’ve uncovered the basics in Lion, Mac Kung Fu is your next step. You’ll learn how to master everyday tools such as the Dock, Spotlight, Mission Control, …

The Web Application Hacker’s Handbook, 2nd Edition

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise …

Hacking and Securing iOS Applications

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must – chances are very high that your company’s iOS applications …

Ubuntu Unleashed 2012 Edition

Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been …

Computer Security Fundamentals, 2nd Edition

This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …

Google+: The Missing Manual

If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools