Book Description: Wireshark is the world’s foremost network protocol analyzer for network analysis and troubleshooting. This book will walk ...Read More
Wireshark Network Security
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT archi...Read More
The IoT Hacker’s Handbook
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: The fast and easy way to crack codes and cryptograms Did you love Dan Brown’s The Lost Symbol? Are you fascinated by secre...Read More
Cracking Codes and Cryptograms For Dummies
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticit...Read More
CEH Certified Ethical Hacker Practice Exams, 4th Edition
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the k...Read More
Waging Cyber War
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Break down the misconceptions of the Internet of Things by examining the different security building blocks available in I...Read More
Demystifying Internet of Things Security
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration princip...Read More
System Administration Ethics
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in...Read More
Bug Bounty Hunting for Web Security
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public a...Read More
Advanced API Security, 2nd Edition
Reviewed by Shelock
on
May 24, 2020
Rating: 5
Book Description: Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an orga...Read More
Identity Attack Vectors
Reviewed by Shelock
on
May 24, 2020
Rating: 5