Read more about books
Bookmark and Share
  • eBook: APT Protection for Dummies

    05.09.2014

    This eBook explains how Advanced Persistent Threat (APT) protection solutions work, and how they can help your organization get the upper hand against adversaries.

  • eBook: BYOD Policy Roadmap

    01.09.2014

    Every business needs a clearly articulated position on BYOD, even if it chooses not to allow for it.

  • Social Engineering Penetration Testing

    15.08.2014

    Authors: Gavin Watson, Andrew Mason, and Richard Ackroyd Pages: 390 Publisher: Syngress ISBN: 0124201245 Introduction We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets - regularly take advantage of this fact to gain a foothold into computer systems and networks.

  • Targeted Cyber Attacks

    01.08.2014

    Authors: Aditya Sood, Richard Enbody Pages: 158 Publisher: Syngress ISBN: 0128006048 Introduction Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe.

  • Computer Incident Response and Forensics Team Management

    21.07.2014

    Author: Leighton Johnson Pages: 352 Publisher: Syngress ISBN: 159749996X Introduction In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers.




Spotlight

The Software Assurance Marketplace: A response to a challenging problem

Posted on 20 October 2014.  |  The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has recognized how critical the state of software security is to the DHS mission.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //