The Hardware Trojan War

The Hardware Trojan War

This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan...

Privileged Attack Vectors

Privileged Attack Vectors

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks...

Serious Cryptography

Serious Cryptography

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away...

Industrial Cybersecurity

Industrial Cybersecurity

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure...

Ubuntu using hacking

Ubuntu using hacking

The name of this book is Ubuntu Ushing Hacking. This book write is a Indian author Meet Chauhan. With the...

Cyber Insecurity

Cyber Insecurity

Cyber security is a completely man made phenomenon, which has become the most complex threat to modern societies and disruptor...