Free Delivery Over $100
10062 books were found.
Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more... Read More >>
Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests About This Book... Read More >>
Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics About This Book... Read More >>
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About... Read More >>
Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About... Read More >>
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 About This Book... Read More >>
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker... Read More >>
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals... Read More >>
This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone... Read More >>
This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments.... Read More >>
This book is a compilation of selected papers from the Sixth International Symposium on Software Reliability, Industrial... Read More >>
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial,... Read More >>
Align your SOC with the ATT&CK framework and follow practical examples for successful implementation Purchase of... Read More >>
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including... Read More >>
"Welcome to ""Navigating the Dark Waters of Cybersecurity Incident Response,"" a comprehensive guide that will help... Read More >>
This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research,... Read More >>
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference... Read More >>
This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education... Read More >>
""Seth Stephens-Davidowitz is more than a data scientist. He is a prophet for how to use the data revolution to... Read More >>
The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence,... Read More >>
"Optimización de redes inalámbricas industriales mediante diseño... Read More >>
Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive... Read More >>
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis... Read More >>
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible... Read More >>