Mastering Python Forensics

Mastering Python Forensics

Digital forensic analysis is the process of examining and extracting data digitally and examining it. Python has the combination of power, expressiveness, and ease of use that makes it an essential complementary tool to the traditional, off-the-shelf digital forensic tools. This book will teach you how to perform…

Metasploit Penetration Testing Cookbook, Second Edition

Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is…

Handbook of Communications Security

Handbook of Communications Security

“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to the most advanced and updated. Communications represent a strategic sector for privacy protection and for personal, corporate, homeland, and international security. The interception, damage or loss of information…

Network Security Assessment, 3rd edition

Network Security Assessment, 3rd edition

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work…

Immune Web: What makes the Internet Safe?

Immune Web: What makes the Internet Safe?

A personalized Internet Guide to protect your from everything unsafe on 21st century Web. Covering dozens of topic from simple passwords to complex dark internet. It’s the only thing you will ever need for your personal protection of your virtual briefcase.

Instant Penetration Testing

Instant Penetration Testing

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich screenshots for easy comprehension.This is a How-to guide, written with practicality in mind. Theory is…

Security and the Networked Society

Security and the Networked Society

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic…

Essential Cybersecurity Science

Essential Cybersecurity Science

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating…

Security and Privacy for Mobile Healthcare Networks

Security and Privacy for Mobile Healthcare Networks

This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future challenges and research problems are also identified….

GlassFish Security

GlassFish Security

Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a programmatic approach to understand Java EE and GlassFish security.You will find plenty of code samples in this book. It is easy to…