Computer Security Fundamentals (2nd Edition)
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is...
Learning iOS Forensics
A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools
About This Book
Perform logical, physical, and file system acquisition along with jailbreaking the device
Get acquainted with various case studies on different forensic toolkits...
Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...
|Result Page: 13 12 11 10 9 8 7 6 5 4 |