Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the
two together and write a book? Well, surely there will be some individuals that may make that
assumption as to the motivation behind the publication of this book. The real motivation behind
the development of this book is because...
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...
Information is the most valuable resource in the 21st century. Whether for a
consumer looking for a restaurant in San Francisco, a small business woman checking
textile prices in Bangalore, or a financial services executive in London studying
stock market trends, information at the moment of decision is key in providing the...
Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names...
LEGO MINDSTORMS lets you design and program robots that can do just about anything!
The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination. Initially designed for users 12 and up, LEGO MINDSTORMS has taken off with LEGO enthusiasts of...
Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...
Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and...
Desktop virtualization is a very broad topic, which can encompass various virtualization technologies.
This book is aimed at specifically addressing how to implement a virtual desktop infrastructure (VDI)
solution using Citrix XenDesktop.
This book is not meant as a definitive guide to any one of the technologies...
The Android mobile platform has quickly risen from its first phone in October 2008
to the most popular mobile operating system in the world by early 2011. The
explosive growth of the platform has been a significant win for consumers with
respect to competition and features. However, forensic analysts and security engineers
have...
This book is intended for individuals who are interested in the iPhone and other
iOS devices and, more importantly, in the type of data that is stored and can be
recovered from these devices. The demand for mobile forensics has grown tremendously
with the release of smart phones. Communication on these devices is now
documented...
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...