Please turn on your JavaScript for this page to function normally.
Review: Data Breach Preparation and Response
Review: Data Breach Preparation and Response

About the author Kevvie Fowler is a Partner and National Cyber Response Leader for KPMG Canada and has over 19 years of IT security and forensics experience. He is a SANS …

The Basics of Cyber Safety
Review: The Basics of Cyber Safety

About the authors John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in …

Professional Penetration Testing, Second Edition

Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …

Unified Communications Forensics

“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …

The Hacker’s Guide to OS X: Exploiting OS X from the Root Up

With increasing market share and popularity, OS X is getting more attention from cybercriminals and hackers alike. This book wants to ride on that rising success and provide …

Client-Side Attacks and Defense

Whether it's security vulnerabilities in software used by millions of home users and employees, or the natural human tendency to trust what comes at us, but even the most …

Wireless Reconnaissance in Penetration Testing

Reconnaissance should always be the first stage of a cyber attack or penetration test, and the success of these attempts is usually closely tied with the quality of …

The Basics of Digital Forensics

Computers, mobile devices and the Internet have become an integral part of our daily lives. They are helpful tools, but they are also sources of information that one would not …

Low Tech Hacking

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …

The Basics of Hacking and Penetration Testing

Have you always wondered about how penetration testing is performed, but never had the opportunity to ask a professional about it or to witness him (or her) at work? If that's …

Cybercrime and Espionage

The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …

iPhone and iOS Forensics

With the seemingly unstoppable popularity of Apple mobile devices such as the iPhone and the iPad, forensic specialists need to learn about the specific device models and …

Don't miss

Cybersecurity news