Introducing Microsoft's flagship wireless development toolThe .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing...
150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This...
AVVID (Architecture for Voice, Video, and Integrated Data), the latest development from Cisco Systems is redefining the way businesses communicate...
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity...
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current...
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive...
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective...
Learn to pull “digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths...
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account...
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to...