Metasploit: The Penetration Tester’s Guide

Metasploit Framework (MF), the open source tool for launching exploits against remote machines, is a well-loved instrument that allows penetration testers to automate routine …

The Basics of Digital Forensics

Computers, mobile devices and the Internet have become an integral part of our daily lives. They are helpful tools, but they are also sources of information that one would not …

Network Warrior, 2nd Edition

If you are interested in knowing everything that you can possibly know about networking, chances are you were already urged to read Gary Donahue's Network Warrior. Four years …

Preventing Good People From Doing Bad Things

As the number of known security breaches seemingly rises exponentially with every passing day, business managers and the general public are becoming increasingly aware of a …

BackTrack 5 Wireless Penetration Testing

If you're considering a career in penetration testing, you probably already know that BackTrack is the Linux distribution favored by most pentesters due to it being preloaded …

A Bug Hunter’s Diary

For individuals who make a living developing and maintaining software systems, finding bugs in their own code is almost a daily ritual. Working on software developing projects …

The Basics of Hacking and Penetration Testing

Have you always wondered about how penetration testing is performed, but never had the opportunity to ask a professional about it or to witness him (or her) at work? If that's …

Cybercrime and Espionage

The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …

iPhone and iOS Forensics

With the seemingly unstoppable popularity of Apple mobile devices such as the iPhone and the iPad, forensic specialists need to learn about the specific device models and …

CCNP Security Secure 642-637 Official Cert Guide

The title of the book says it all - thick and all-encompassing, it covers the topics addressed in the exam CCNP Secure 642-637, but it should not be considered the only source …