Cisco CCENT Mind Share Game
The Cisco CCENT Mind Share Game covers key networking topics and is designed to test the players' technical knowledge and their ability to concentrate and perform under …
Acunetix Web Vulnerability Scanner 7
A manual search for vulnerabilities would simply take too much time, so penetration testers usually use an automated web vulnerability scanner to do the preliminary work for …
Securing the Smart Grid: Next Generation Power Grid Security
Smart grids are a reality and the future, and they promise greater reliability, affordability, efficiency and, hopefully, a better and environmentally cleaner exploitation of …
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking is not your typical "hacking" book. By comparing hackers with ninjas, the authors try to demonstrate how the ninja way of doing things can be translated to fit …
Seven Deadliest Network Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at networks: DoS, MiTM, war dialing, penetration …
Dissecting the Hack: The F0rb1dd3n Network (Revised Edition)
This book approaches the subject of hacking in an interesting way. Part fiction, part reference manual, its target audience are people who want to or should know more about …
Seven Deadliest Microsoft Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at Microsoft's networks and software: Windows, SQL and …
CISSP Study Guide
The title of the book is self-explanatory - this is a study guide for all of you out there who aspire to become a Certified Information Systems Security Professional. …
Seven Deadliest Wireless Technologies Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at wireless technologies and devices that use …
Virtualization for Security
Virtualization is among the hottest topics in the IT world today. While the term itself can mean many different things in IT, most of the time it actually refers to so-called …
Designing Network Security, 2nd Edition
Designing Network Security is a book that will teach you how to secure your corporate network infrastructure. Starting with security fundamentals, you'll learn how to define a …
CCNA Security 640-553 Cert Flash Cards Online
The CCNA Security 640-553 Cert Flash Cards Online is a custom flash card application loaded with 250 total questions that offer a good way to review all the objectives on the …
Featured news
Resources
Don't miss
- The XCSSET info-stealing malware is back, targeting macOS users and devs
- A PostgreSQL zero-day was also exploited in US Treasury hack (CVE-2025-1094)
- Two Estonians plead guilty in $577M cryptocurrency Ponzi scheme
- How CISOs can balance security and business agility in the cloud
- Orbit: Open-source Nuclei security scanning and automation platform