Please turn on your JavaScript for this page to function normally.
Social Engineering Penetration Testing

We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …

Targeted Cyber Attacks

Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe. This book aims to tell you how …

Computer Incident Response and Forensics Team Management

In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers. Having an internal security incident response …

Penetration Testing: A Hands-On Introduction to Hacking

There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start. This …

Professional Penetration Testing, Second Edition

Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …

Network Security Through Data Analysis

One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …

Thinking with Data: How to Turn Information into Insights

With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover …

Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001

A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the …

Investigating Internet Crimes

Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …

Social Media Security

I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network …

New book on implementing business continuity according to ISO 22301

“Becoming Resilient: The Definitive Guide to ISO 22301 Implementation” describes the process of implementing business continuity according to ISO 22301, an …

Unified Communications Forensics

“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools