Security related eBooks
2014 | ISBN: 1118836359 | English | 224 pages | PDF | 1 MB Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all fac...
( Category:Security related Date:21 Jul 2014 )
2014 | 150 Pages | ISBN: 1849695105 | EPUB, MOBI, PDF | 7 MB + 11 MB + 3 MB This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and...
( Category:Security related Date:07 Jul 2014 )
English | ISBN: 1849283966 | 2012 | 340 pages | PDF | 9 MB Cloud services, such as SalesForce, Amazon Web Services and Microsoft Azure, offer enterprise grade computing power to businesses of all size...
( Category:Security related Date:01 Jul 2014 )
2014 | ISBN-10: 1782174176 | 110 pages | EPUB, MOBI, PDF | 28 MB Veeam Backup Replication for VMware is a backup and replication solution that provides data protection for virtualized VMware vSphere e...
( Category:Security related Date:28 Jun 2014 )
2014 | 454 Pages | ISBN: 184951948X | EPUB + MOBI | 18 MB + 27 MB Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities un...
( Category:Security related Date:27 Jun 2014 )
2013 | 456 Pages | ISBN: 1118442318 | EPUB, MOBI, PDF | 6 MB + 9 MB + 15 MB Essential reading for cybersecurity professionals, security analysts, policy experts, decision¨Cmakers, activists, and law en...
( Category:Security related Date:26 Jun 2014 )
2014 | ISBN-10: 1466568445 | 498 pages | PDF | 11 MB In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents welfare, trust manag...
( Category:Security related Date:23 Jun 2014 )
2013 | 896 Pages | ISBN: 0071784357 | PDF | 24 MB Todays complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...
( Category:Security related Date:21 Jun 2014 )
English | 2014 | ISBN: 1447164482 | 90 pages | PDF | 1,9 MB With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential. Written b...
( Category:Security related Date:19 Jun 2014 )
2014 | 110 Pages | ISBN: 1783559020 | EPUB + MOBI | 15 MB + 20 MB With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professi...
( Category:Security related Date:16 Jun 2014 )
2014 | ISBN: 1593275641 | English | 528 pages | PDF | 12 MB Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information securit...
( Category:Security related Date:12 Jun 2014 )
2014 | 112 Pages | ISBN: 1849698546 | EPUB, MOBI, PDF | 6 MB + 9 MB + 13 MB Designing the user experience (UX) for websites and applications can be an exhilarating and satisfying experience, but it ca...
( Category:Security related Date:10 Jun 2014 )
2014 | 116 Pages | ISBN: 1783550996 | EPUB, MOBI, PDF | 5 MB + 8 MB + 2 MB Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-worl...
( Category:Security related Date:10 Jun 2014 )
2014 | ISBN: 1782167161 | 261 pages | PDF | 19 MB Android Security Cookbook discusses many common vulnerabilities and security related shortcomings in Android applications and operating systems. The b...
( Category:Security related Date:02 Jun 2014 )
2013 | ISBN: 031339895X | English | 290 pages | PDF | 2 MB Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a comprehensive and highly topical one-stop sour...
( Category:Security related Date:30 May 2014 )
Popular ebooksHack a Wifi Network: Easy way to access Wi(2723)
Introduction to Network Security: Theory a(2088)
Malware, Rootkits & Botnets A Beginner's G(2047)
Windows 10: Security Yes, but Privacy Plea(1944)
The Dark Net Searching: how to search anon(1929)
Thinking Security: Stopping Next Year's Ha(1902)
The Most Indepth Hacker's Guide(1887)
Ethical Hacking 101: How to conduct profes(1858)
Tor Browser: The Ultimate Guide To The Tor(1827)
Hacking and Securing Web Applications(1734)
Tor and The Dark Net: Remain Anonymous Onl(1731)
Network Attacks and Exploitation: A Framew(1672)
Hacking Made Easy: Hack Your Way Through L(1664)
Cybersecurity for Beginners(1556)
Network Security Assessment: Know Your Net(1550)
Hacking Google Maps and Google Earth(1542)
Hacking: The Next Generation(1474)
CISSP (ISC)2 Certified Information Systems(1467)
Computer Virus: Introducing... Computer Vi(1414)
The Artificial Intelligence Conspiracy: Ho(1412)