The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every...
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable...
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every...
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic...
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into...
Compete with the big players in today's E-commerce marketplaceElectronic Data Interchange (EDI) has long been the standard for large business...
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console — it...
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational...
Workplace violence in all its forms is becoming more prevalent and pervasive every year. Workplace Violence: Planning for Prevention and Response...
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way...