Please turn on your JavaScript for this page to function normally.
The Basics of Hacking and Penetration Testing

Have you always wondered about how penetration testing is performed, but never had the opportunity to ask a professional about it or to witness him (or her) at work? If that's …

Cybercrime and Espionage

The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …

iPhone and iOS Forensics

With the seemingly unstoppable popularity of Apple mobile devices such as the iPhone and the iPad, forensic specialists need to learn about the specific device models and …

CCNP Security Secure 642-637 Official Cert Guide

The title of the book says it all - thick and all-encompassing, it covers the topics addressed in the exam CCNP Secure 642-637, but it should not be considered the only source …

Cisco Firewalls

There used to be a time when firewalls were considered a full proof solution for protecting networks, and that time is long gone. History has taught us there are no silver …

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

If you followed our site over the years, you had the opportunity to read a little about some of the protagonists of this book: Max Vision the creator of CardersMarket, Albert …

IPv6 for Enterprise Networks

The February news that the last batch of IPv4 addresses has been distributed has resounded across the Internet as a final wake up call. It made everybody aware of the fact …

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

The only way you could have missed the fact that the social networking boom has led to huge amounts of social data becoming available to knowledgeable searchers is if you …

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

The management of identities and online authentication are two problems to which so far only Public Key Infrastructure (PKI) has managed to give a secure and scalable answer …

Building the Mobile Internet

It is common knowledge that the world is going mobile, and that we want to be able to connect to the Internet wherever we are. As the Internet’s original protocols and design …

Security for Microsoft Windows System Administrators

Security for Microsoft Windows System Administrators aims at teaching the reader the very basics of information security: general concepts, some cryptography, concepts and …

Computer Incident Response and Product Security

As time passes, more and more companies realize the importance of having an in-house incident response team. But how to go about forming one and organizing its functioning? …

Don't miss

Cybersecurity news