Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...
The Internet, as a worldwide communication network, has changed our daily life in
many ways. A new paradigm of commerce allows individuals to shop online. The
World Wide Web (WWW) allows people to share information. The E-mail technology
conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
I still remember sitting down with my brand new copy of Writing Secure Code by Michael
Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web
reports, (before the term "Bl" came to embody what at the time we thought was an incredibly
innovative way to display call center metrics for managing...
Welcome to Sams Teach Yourself TCP/IP in 24 Hours, Fifth Edition. This book provides a clear
and concise introduction to TCP/IP for newcomers, and also for users who have worked with
TCP/IP but would like a little more of the inside story. Unlike other networking primers that
point and click...
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is...
Since the publication of Malware Forensics: Investigating and
Analyzing Malicious Code in 2008, the number and
complexity of programs developed for malicious and illegal
purposes has grown substantially. The 2011 Symantec Internet
Security Threat Report announced that over 286 million new
threats emerged in the past year....
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
The celebration welcoming the second half of the 21st century on 31 December
2050 was subdued in the Persian Gulf. The major cities of Saudi Arabia, Kuwait,
and others were dark. No fireworks or other signs of jubilation. Even those among
them who had diversified their economies by investing in tourism, technology parks,...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
Security Smarts for the Self-Guided IT Professional
“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps.