Security Books



Bookstore > Books > Security

Anti-Hacker Tool Kit, 4th Edition

Anti-Hacker Tool Kit, 4th Edition

by Mike Shema

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition inclu...

Price:  $32.99  |  Publisher:  McGraw-Hill  |  Release:  2014

The Rails 4 Way

The Rails 4 Way

by Obie Fernandez, Kevin Faustino

Ruby on Rails 4 is leaner, tighter, and even more valuable to professional web developers. More than ever, it helps you focus on what matters most: delivering business value via clean and maintainable code.The Rails 4 Way is the only comprehensive, authoritative guide to delivering production-quality code with Rails 4. Kevin Faustino joins pioneering Rails developer Obie Fernandez to illuminate the entire R...

Price:  $1.40  |  Publisher:  Addison-Wesley  |  Release:  2014

The Missing Link

FREE EBOOK - The Missing Link

by Michael Mendez

Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and standards. Navigating a project from concept to completion oft...

Publisher:  Self-publishing  |  Release:  2014

Android Hacker's Handbook

Android Hacker's Handbook

by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security arc...

Price:  $12.00  |  Publisher:  Wiley  |  Release:  2014

The Browser Hacker's Handbook

The Browser Hacker's Handbook

by Wade Alcorn, Christian Frichot, Michele Orru

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.The web browser has become the most popular and widely used computer &a...

Price:  $44.99  |  Publisher:  Wiley  |  Release:  2014

Java Programming Interviews Exposed

Java Programming Interviews Exposed

by Noel Markham

Java is a popular and powerful language that is a virtual requirement for businesses making use of IT in their daily operations. For Java programmers, this reality offers job security and a wealth of employment opportunities. But that perfect Java coding job won't be available if you can't ace the interview. If you are a Java programmer concerned about interviewing, Java Programming Interviews Exp...

Price:  $25.99  |  Publisher:  Wrox  |  Release:  2014

Practical Reverse Engineering

Practical Reverse Engineering

by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, sec...

Price:  $40.99  |  Publisher:  Wiley  |  Release:  2014

Hacking Point of Sale

Hacking Point of Sale

by Slava Gomzin

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of ma...

Price:  $32.99  |  Publisher:  Wiley  |  Release:  2014

The Art of Memory Forensics

The Art of Memory Forensics

by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving to...

Price:  $34.00  |  Publisher:  Wiley  |  Release:  2014

Cyber Threat!

Cyber Threat!

by MacDonnell Ulsch

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most v...

Price:  $17.90  |  Publisher:  Wiley  |  Release:  2014

Pages: ←Previous | 1 ... 48, 49, 50, 51, 52 ... 74 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.