Please turn on your JavaScript for this page to function normally.
Car
Review: The Car Hacker’s Handbook

About the author Craig Smith runs Theia Labs, a research firm that focuses on security auditing and building hardware and software prototypes. He is also a founder of the …

Businessman
Review: Breaking into Information Security

Breaking into Information Security is a practical guide for people outside and inside the information security industry. The former can find out how to put their foot in the …

Review: Becoming a Global Chief Security Executive Officer

“If protecting a business were as simple as deploying technologies such as firewalls, intrusion detection systems, and secured development life cycle processes, or …

ICLOAK Pro
Review: ICLOAK Pro

Maintaining digital security and online privacy is difficult. As things move(d) online, cyber attacks of different kinds and magnitudes are constantly being mounted against …

mobile devices
Review: Mobile Data Loss

Employees increasingly use mobile devices for work and to access their company’s resources. That should be, by now, an accepted reality for all those who work in the IT …

Review: Automating Open Source Intelligence

Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …

Google
Review: Google Hacking for Penetration Testers, Third Edition

Authors: Johnny Long, Bill Gardner, Justin Brown. Pages: 234 Publisher: Syngress ISBN: 0128029641 Introduction The Internet can be a great source of information, and Google …

Google earth
Review: Google Earth Forensics

Learn how to use Google Earth geo-location in your digital forensic investigations.

Netwrix Auditor
Review: Change and configuration auditing with Netwrix Auditor 7.0

Netwrix Auditor is a powerful change and configuration auditing platform that leverages the data collected from all parts of the company network to provide detailed …

IoT
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …

Keyboard
Next Generation Red Teaming

Author: Henry DalzielPages: 46Publisher: SyngressISBN: 0128041714 Introduction Do you know the difference between penetration testing and red teaming? This book will explain …

encryptr
Encryptr: Open source cloud based password manager

Encryptr is based on the Crypton JavaScript framework. The whole idea behind the Crypton concept is to enable developers to store data on the remote server in such way that …

Don't miss

Cybersecurity news