Client-Side Attacks and Defense

Whether it's security vulnerabilities in software used by millions of home users and employees, or the natural human tendency to trust what comes at us, but even the most …

Secret Contacts+ 1.0 for iOS

Secret Contacts+ enables you to manage a completely private contact list. You can either add new contacts or copy the ones from your current contact list.

Advanced Persistent Threat

As more and more information becomes available and is stored in electronic form, the logical consequence is that APT actors will focus on breaching networks and systems on …

Windows 8 Inside Out

When Microsoft CEO Steve Ballmer launched Windows 8, he dubbed it a re-imagined operating system. When you introduce so many new features and a different UI, you're going to …

Wireless Reconnaissance in Penetration Testing

Reconnaissance should always be the first stage of a cyber attack or penetration test, and the success of these attempts is usually closely tied with the quality of …

OS X Mountain Lion: The Missing Manual

With more than 200 new features in Mountain Lion, Apple has once again delivered a robust operating system that stays ahead of the curve. This immense book is here to help you …

WordPress 3 Ultimate Security

This book has over 350 pages and, as the title says, aims to be the ultimate Wordpress 3 security guide. The author built the book around the premise that the website is as …

Hacking Web Apps

Web security impacts applications, servers and browsers. Successful attacks against Web applications and sites means bad news for their owners, developers and users. This book …

GateWall Mail Security

rotects corporate environments from malware threats, spam and data loss issues. This software-based solution is installed within the corporate intranet and acts as a …