The IDA Pro Book

The IDA Pro Book

No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The…

Hackers

Hackers

Steven Levy’s classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak. Hackers traces the exploits of innovators from the research labs…

Hacking Exposed Web Applications, 3rd Edition

Hacking Exposed Web Applications, 3rd Edition

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and…

Hacking Exposed Wireless, 2nd Edition

Hacking Exposed Wireless, 2nd Edition

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today’s established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This…

Protecting Your Mobile App IP: The Mini Missing Manual

Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do happen, you’ll have the…

Beautiful Security

Beautiful Security

In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems in the face of ever-increasing threats. You’ll learn how new and more aggressive security measures work — and where they will lead us. This far-reaching discussion takes…

Cloud Security and Privacy

Cloud Security and Privacy

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you’ll learn what’s at stake when you trust your data to…

Fragile networks

Fragile networks

A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain World presents a comprehensive study of network systems and the roles these systems play in our everyday lives. This…