Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise...
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a...
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth...
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book...
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational...
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led...
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that...
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three...
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and...
In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based...