Anti-Hacker Tool Kit, 4th Edition
by Mike Shema
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition inclu...
Price: $32.99 | Publisher: McGraw-Hill | Release: 2014
by Obie Fernandez, Kevin Faustino
Ruby on Rails 4 is leaner, tighter, and even more valuable to professional web developers. More than ever, it helps you focus on what matters most: delivering business value via clean and maintainable code.The Rails 4 Way is the only comprehensive, authoritative guide to delivering production-quality code with Rails 4. Kevin Faustino joins pioneering Rails developer Obie Fernandez to illuminate the entire R...
Price: $1.40 | Publisher: Addison-Wesley | Release: 2014
by Michael Mendez
Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.While it is easy to describe conceptually, implementation is accompanied by an overwhelming variety of languages, platforms, templates, frameworks, guidelines, and standards. Navigating a project from concept to completion oft...
Publisher: Self-publishing | Release: 2014
by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security arc...
Price: $12.00 | Publisher: Wiley | Release: 2014
by Wade Alcorn, Christian Frichot, Michele Orru
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.The web browser has become the most popular and widely used computer &a...
Price: $44.99 | Publisher: Wiley | Release: 2014
Java Programming Interviews Exposed
by Noel Markham
Java is a popular and powerful language that is a virtual requirement for businesses making use of IT in their daily operations. For Java programmers, this reality offers job security and a wealth of employment opportunities. But that perfect Java coding job won't be available if you can't ace the interview. If you are a Java programmer concerned about interviewing, Java Programming Interviews Exp...
Price: $25.99 | Publisher: Wrox | Release: 2014
by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, sec...
Price: $40.99 | Publisher: Wiley | Release: 2014
by Slava Gomzin
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of ma...
Price: $32.99 | Publisher: Wiley | Release: 2014
by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving to...
Price: $34.00 | Publisher: Wiley | Release: 2014
by MacDonnell Ulsch
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most v...
Price: $17.90 | Publisher: Wiley | Release: 2014