Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …
Next Generation Red Teaming
Author: Henry DalzielPages: 46Publisher: SyngressISBN: 0128041714 Introduction Do you know the difference between penetration testing and red teaming? This book will explain …
Internet of Things: Security misconceptions, expectations, and the future
Nitesh Dhanjani is a well-known security researcher, writer, and speaker. He is currently Executive Director, Cybersecurity, at Ernst & Young, where he advises C-suite …
Cloud Storage Security, A Practical Guide
Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …
Penetration Testing With Raspberry Pi
Authors: Joseph Muniz, Aamir LakhaniPages: 142 pagesPublisher: Packt PublishingISBN: 1784396435 Introduction Raspberry Pi is a small and portable single board computer that …
Review: Build A Security Culture
Author: Kai Roer Pages: 124 Publisher: IT Governance Publishing ISBN: 1849287163 Introduction Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded …
Information Security Analytics
Authors: Mark Talabis, Robert McPherson, I. Miyamoto, Jason Martin Pages: 182 Publisher: Syngress ISBN: 0128002077 Introduction We’ve all heard about Big Data and …
Detecting and Combating Malicious Email
Authors: Julie JCH Ryan and Cade Kamachi Pages: 94 Publisher: Syngress ISBN: 0128001100 Introduction After years and years of security professionals explaining the dangers of …
Python Forensics
Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …
eBook: Cybersecurity for Dummies
NOTE: This book is no longer available, thanks for your interest. APTs have changed the world of enterprise security and how networks and organizations are attacked. These …
Training kids to become infosec superheroes
Children today embark on life in two interconnected worlds, the physical and the virtual. And just as they need to learn how to be smart and safe in the physical world, they …
Hacking and Penetration Testing with Low Power Devices
This book is primarily intended for penetration testers who want to widen their skill set to include the knowledge of how to perform testing with small, low-powered devices …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security