eBook: BYOD Policy Roadmap
Every business needs a clearly articulated position on BYOD, even if it chooses not to allow for it. What’s your position? Do you even have one? If you’re …
Social Engineering Penetration Testing
We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …
Targeted Cyber Attacks
Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe. This book aims to tell you how …
Computer Incident Response and Forensics Team Management
In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers. Having an internal security incident response …
Penetration Testing: A Hands-On Introduction to Hacking
There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start. This …
Professional Penetration Testing, Second Edition
Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …
Network Security Through Data Analysis
One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …
Thinking with Data: How to Turn Information into Insights
With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover …
Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001
A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the …
Investigating Internet Crimes
Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …
Social Media Security
I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network …
New book on implementing business continuity according to ISO 22301
“Becoming Resilient: The Definitive Guide to ISO 22301 Implementation” describes the process of implementing business continuity according to ISO 22301, an …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains