Cyber Threat

Cyber Threat

(1 reviews, 618 downloads)
, 2014-07-28, 224 pages, pdf, epub
Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various…
Basic Security Testing with Kali Linux

Basic Security Testing with Kali Linux

(9 reviews, 1246 downloads)
, 2014-01-05, 310 pages, pdf, epub
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys…
Hacking Exposed Unified Communications & VoIP, 2nd Edition

Hacking Exposed Unified Communications & VoIP, 2nd Edition

(6 reviews, 860 downloads)
, 2013-11-25, 560 pages, pdf, epub
The latest techniques for averting UC disaster “This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” —Dan York,…
Certified Ethical Hacker (Ceh) 31 Success Secrets

Certified Ethical Hacker (Ceh) 31 Success Secrets

(1 reviews, 770 downloads)
, 2013-07-14, 18 pages, pdf, epub
There has never been a Certified Ethical Hacker (CEH) Guide like this. Certified Ethical Hacker (CEH) 31 Success Secrets is not about the ins and outs of Certified Ethical Hacker (CEH). Instead, it answers the top 31 questions that we…
Hacking Exposed Mobile: Security Secrets & Solutions

Hacking Exposed Mobile: Security Secrets & Solutions

(11 reviews, 1029 downloads)
, 2013-07-09, 320 pages, pdf, epub
Proven security tactics for today’s mobile apps, devices, and networks “A great overview of the new threats created by mobile devices. …The authors have heaps of experience in the topics and bring that to every chapter.” — Slashdot Hacking Exposed…