Building the Mobile Internet

It is common knowledge that the world is going mobile, and that we want to be able to connect to the Internet wherever we are. As the Internet’s original protocols and design …

Computer Incident Response and Product Security

As time passes, more and more companies realize the importance of having an in-house incident response team. But how to go about forming one and organizing its functioning? …

Cisco CCENT Mind Share Game

The Cisco CCENT Mind Share Game covers key networking topics and is designed to test the players' technical knowledge and their ability to concentrate and perform under …

Acunetix Web Vulnerability Scanner 7

A manual search for vulnerabilities would simply take too much time, so penetration testers usually use an automated web vulnerability scanner to do the preliminary work for …

Seven Deadliest Network Attacks

Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at networks: DoS, MiTM, war dialing, penetration …

Seven Deadliest Microsoft Attacks

Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at Microsoft's networks and software: Windows, SQL and …

CISSP Study Guide

The title of the book is self-explanatory - this is a study guide for all of you out there who aspire to become a Certified Information Systems Security Professional. …