“A must-read for all Java developers. . . . Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals
With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert. Overview
Develops Real World Approaches to Penetration testing using Metasploit
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and...
Whether an international corporation or a small business, developing and utilizing
a Business Continuity Management (BCM) Plan protects companies and
their personnel, facilities, materials, and activities from the broad spectrum of risks
that face businesses and government agencies on a daily basis, whether at home or...
The first comprehensive guide to discovering and preventing attacks on the Android OS
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...
This book is an entertaining read, that shows how to change your mindset from website construction to website destruction so as to avoid writing dangerous code.
This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where code may be exploited to gain access to--or break...
This book explores the phenomenon of researchers at risk: that is, the experiences of scholars whose research topics require them to engage with diverse kind of dangers, uncertainties or vulnerabilities. This risk may derive from working with variously marginalised individuals or groups, or from being members of such groups themselves. At other...