Mac Kung Fu: Over 300 Tips, Tricks, Hints, and Hacks for OS X Lion
After you’ve uncovered the basics in Lion, Mac Kung Fu is your next step. You’ll learn how to master everyday tools such as the Dock, Spotlight, Mission Control, …
The Web Application Hacker’s Handbook, 2nd Edition
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise …
Hacking and Securing iOS Applications
If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must – chances are very high that your company’s iOS applications …
Ubuntu Unleashed 2012 Edition
Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been …
Protect your online image with tips from Microsoft
In observance of Data Privacy Day 2012, Microsoft is releasing new data about consumer behaviors online and is offering guidance and tips to help people better manage their …
Computer Security Fundamentals, 2nd Edition
This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …
Google+: The Missing Manual
If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …
Network Security First-Step, 2nd Edition
With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …
Low Tech Hacking
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …
Data Privacy Day 2012 is upon us
Coordinated and led by the National Cyber Security Alliance (NCSA), Data Privacy Day on January 28, 2012 will promote the importance of data privacy and encourage digital …
Leading CSOs outline roadmap to combat advanced threats
RSA released new insights from a group of the world’s leading CSOs, designed to help corporations and governments improve visibility into advanced threats ranging from …
The Information Diet
The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025