Introduction to Cybercrime

Introduction to Cybercrime

Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments,...

Wireless Hacking

Wireless Hacking

Introduction to Wireless Hacking with Kali Linux. Understanding the need to test your wireless systems. Wireless vulnerabilities. Thinking like a...

Hardware IP Security and Trust

Hardware IP Security and Trust

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of...

NTP Security

NTP Security

Learn  the risks associated with Network Time Protocol (NTP) security and how to minimize those risks in daily deployment. Disruption of...

DDoS Attacks

DDoS Attacks

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a...

From Hacking to Report Writing

From Hacking to Report Writing

This book will teach you everything you need to know to become a professional security and penetration tester. It simplifies...

Cloud Computing Security

Cloud Computing Security

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide...