Faster previews. Personalized experience. Get started with a FREE account.
Building a Comprehensive IT Security Program

Building a Comprehensive IT Security Program

by Jeremy Wittkop
220 Pages · 2016 · 10.6 MB · 2,871 Downloads · New!
" You miss 100% of the shots you don’t take. ” ― Wayne Gretzky
Accumulo
by Aaron Cordova
552 Pages · 2015 · 13.76 MB · 3,975 Downloads · New!
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.
Advanced API Security
by Prabath Siriwardena
260 Pages · 2014 · 2.5 MB · 4,836 Downloads · New!
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs.
Advanced API Security, 2nd Edition
by Prabath Siriwardena
449 Pages · 2020 · 11.8 MB · 1,374 Downloads · New!
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about using OAuth 2.0 and related profiles to access APIs securely with web applications, single-page applications, native mobile applications and browser-less applications. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits.
Advanced Penetration Testing for Highly-Secured Environments
by Lee Allen
414 Pages · 2012 · 12.8 MB · 4,700 Downloads · New!
Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab.
Android Hacker’s Handbook
by Collin Mulliner
576 Pages · 2014 · 7.9 MB · 3,198 Downloads · New!
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world’s foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
Android Security Internals
by Nikolay Elenkov
432 Pages · 2014 · 6.7 MB · 3,915 Downloads · New!
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals – until now.