Network security

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Rich Cannings, Himanshu Dwivedi, et al.


Security In Ad-hoc And Sensor Networks

Usa) Beyah Raheem A (Georgia State Univ, Usa) Corbett Cherita L (Sandia Nat'l Lab, et al.


Linux Networking Cookbook

Gregory Boyce


Learning Network Forensics

Samir Datt


Kali Linux Web Penetration Testing Cookbook

Gilberto Najera-Gutierrez


Instant Citrix Security How-to

Carmel Jacob


Learning zANTI2 for Android Pentesting

Miroslav Vitula


Mastering VMware Horizon 6

Peter von Oven and Barry Coombs


Untangle Network Security

Abd El-Monem A.El-Bawab


Getting Started with FortiGate

Rosato Fabbri and Fabrizio Volpe


Mastering Kali Linux Wireless Pentesting

Jilumudi Raghu Ram and Brian Sak


Reverse Deception: Organized Cyber Threat Counter-Exploitation

Sean Bodmer, Max Kilger, et al.


Mommy! There's a Monster in our Computer: The book every...

N K McCarthy and Arthur King


Password Journal

Speedy Publishing LLC

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to help detect unauthorized access or activity that violate our terms of service, as well as to analyze site traffic and performance for our own site improvement efforts. To learn more about these methods, including how to disable them view our Cookie Policy.