You are here: Home > Security
Choose a sub category:
Crytography Forensics & Biometrics
Network & Computer Security Personal Information Security
Security Policies & Procedures Software Security
Web Security
Sort By:
Page of 26
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
List Price: $17.99
Our Price: $16.19
You save $1.80!

This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.
Seven Deadliest Wireless Technologies Attacks
List Price: $24.95
Our Price: $18.71
You save $6.24!

How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
List Price: $24.95
Our Price: $18.71
You save $6.24!

When we think about trust, we naturally think about personal relationships or bank vaults. That's too narrow. Trust is much broader, and much more important. Nothing in society works without trust. It's the foundation of communities, commerce, democracy—everything.
Wireless Hacks
List Price: $24.95
Our Price: $19.95
You save $5.00!

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
List Price: $29.99
Our Price: $22.46
You save $7.53!

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
List Price: $29.95
Our Price: $22.46
You save $7.49!

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test.
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
List Price: $29.95
Our Price: $22.46
You save $7.49!

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).
The Basics of Web Hacking: Tools and Techniques to Attack the Web
List Price: $29.95
Our Price: $22.46
You save $7.49!

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers.
The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy
List Price: $29.95
Our Price: $22.46
You save $7.49!

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test.
Detecting and Combating Malicious Email
List Price: $29.95
Our Price: $22.46
You save $7.49!

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated.