Social Media Security

Social Media Security

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society....

Network and System Security

Network and System Security

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide...

Managing Information Security

Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems,...

FISMA Compliance Handbook

FISMA Compliance Handbook

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what...

Cyber Warfare

Cyber Warfare

Cyber Warfare explores the battlefields, participants and tools and techniques used during today’s digital conflicts. The concepts discussed in this...

Applied Predictive Analytics

Applied Predictive Analytics

Learn the art and science of predictive analytics — techniques that get results Predictive analytics is what translates big data...

Xcode 5 Developer Reference

Xcode 5 Developer Reference

Design, code, and build amazing apps with Xcode 5 Thanks to Apple’s awesome Xcode development environment, you can create the...

Windows 8.1 Bible

Windows 8.1 Bible

Windows 8.1 coverage that goes above and beyond all competitors Serving as an evolutionary update to Windows 8, Windows 8.1...

Android Hacker’s Handbook

Android Hacker’s Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to...

The Browser Hacker’s Handbook

The Browser Hacker’s Handbook

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker’s Handbook gives a practical understanding of hacking the...