Mastering Bitcoin, 2nd Edition

Mastering Bitcoin, 2nd Edition

Join the technological revolution that’s taking the world of finance by storm.¬†Mastering Bitcoin¬†is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you’re building the next killer app, investing in a startup, or simply curious…

Digital Privacy and Security Using Windows

Digital Privacy and Security Using Windows

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and…

VMware vCloud Security

VMware vCloud Security

VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security. This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience…

CISSP in 21 Days, Second Edition

CISSP in 21 Days, Second Edition

Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. This happens when they cover everything but do…

Hacking For Dummies, 3rd Edition

Hacking For Dummies, 3rd Edition

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It’s bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in…

Practical Internet of Things Security

Practical Internet of Things Security

With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need…

Practical Digital Forensics

Practical Digital Forensics

Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing investigation plan and preparing toolkit for investigation. In this book you will explore new and promising forensic processes and…

Mastering Mobile Forensics

Mastering Mobile Forensics

Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with recent smartphones operating systems Starting with a brief…

BeagleBone for Secret Agents

BeagleBone for Secret Agents

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create…

Personal Cybersecurity

Personal Cybersecurity

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home….