Security related eBooks
2014 | ISBN: 1118810112 | English | 312 Pages | PDF + MOBI | 23 +14 MB Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and ...
( Category:Security related Date:23 Apr 2014 )
2014 | ISBN: 1118787315 | English | 384 Pages | EPUB + MOBI | 3 + 4 MB Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or softwa...
( Category:Security related Date:23 Apr 2014 )
2014 | ISBN-10: 111860864X | 576 pages | PDF | 9 MB The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its shar...
( Category:Security related Date:23 Apr 2014 )
English | ISBN: 1466578033 | 2014 | 538 pages | PDF | 11 MB Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the wor...
( Category:Security related Date:18 Apr 2014 )
English | ISBN: 1430261455 | 2014 | 225 pages | PDF | 8 MB For cloud users and providers alike security is an everyday concern yet there are very few books covering cloud security as a main subject. T...
( Category:Security related Date:14 Apr 2014 )
English | ISBN: 1430263555 | 2014 | 325 pages | PDF | 7 MB The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind detailing industry-proven solutions...
( Category:Security related Date:14 Apr 2014 )
2014 | ISBN-10: 1783559020 | 110 pages | PDF | 4.9 MB With the increase of electronic crimes and the need to constantly audit the proper use of resources companies need qualified professionals and app...
( Category:Security related Date:08 Apr 2014 )
English | ISBN: 0786493925 | 2014 | 277 pages | PDF | 2 MB In its 4th edition this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, ...
( Category:Security related Date:08 Apr 2014 )
2014 | ISBN: 1118787315 | English | 384 Pages | EPUB + MOBI | 3 + 4 MB Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or softwa...
( Category:Security related Date:27 Mar 2014 )
English | ISBN: 1782170960 | 2013 | 114 pages | PDF, EPUB | 14 MB Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform b...
( Category:Security related Date:12 Mar 2014 )
English | ISBN: 1782169237 | 2013 | 142 pages | PDF, EPUB | 23 MB Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and...
( Category:Security related Date:10 Mar 2014 )
English | 2014 | PDF | 624 pages | 5,4 Mb Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. ...
( Category:Security related Date:09 Mar 2014 )
English | ISBN: 1782163166 | 2013 | 321 pages | PDF (reup), EPUB | 64 MB Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the mos...
( Category:Security related Date:05 Mar 2014 )
2013 | ISBN: 1783283270 | English | 84 Pages | PDF | 4 MB Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of...
( Category:Security related Date:21 Feb 2014 )
2013 | 242 Pages | ISBN: 1849693609 | EPUB + PDF | 4 MB + 5 MB The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can...
( Category:Security related Date:20 Feb 2014 )