Waging Cyber War

Waging Cyber War

Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and…

CEH Certified Ethical Hacker Practice Exams, 4th Edition

CEH Certified Ethical Hacker Practice Exams, 4th Edition

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v10 exam objectives, this practical guide contains…

The IoT Hacker's Handbook

The IoT Hacker’s Handbook

Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture’s central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You’ll also learn to assess a…

Wireshark Network Security

Wireshark Network Security

Wireshark is the world’s foremost network protocol analyzer for network analysis and troubleshooting. This book will walk you through exploring and harnessing the vast potential of Wireshark, the world’s foremost network protocol analyzer. The book begins by introducing you to the foundations of Wireshark and showing you how…

Cryptography For Dummies

Cryptography For Dummies

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and…

Professional Red Teaming

Professional Red Teaming

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security…

Learning Bitcoin

Learning Bitcoin

The financial crisis of 2008 raised attention to the need for transparency and accountability in the financial world. As banks and governments were scrambling to stay solvent while seeking a sustainable plan, a powerfully new and resilient technology emerged. Bitcoin, built on a fundamentally new technology called “The…

Digital Forensics Basics

Digital Forensics Basics

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder’s footprints and to gather the necessary digital evidence in a forensically sound manner…