Create account Create free account
Sign in
  • Home
    • Business
    • Career development
    • Data
    • Design
    • Hardware
    • Math Science Engineering
    • Other
    • Security
    • Software Development
    • System Administration
    • Travel Hobbies
    • Web Mobile
    • Recommendation
    • Trending Now

eBook Reading

Search Button
All Ebooks
Free Ebooks
Premium Ebooks
  • Title: A to Z
  • Title: Z to A
  • Release Date: Newest to Oldest
  • Release Date: Oldest to Newest
  • View ↓
  • View ↑

Search Results

151 - 180 of 1455 results

Filter
Categories
  • All (35603)
  • Security(1455)
    • Security Operations(154)
    • Security Certifications(269)
    • Governance(66)
    • Digital Forensics(104)
    • Application Security(45)
    • Penetration Testing Ethical Hacking(141)
    • Network Security(98)
    • Frameworks And Standards(90)
    • Security Engineering(66)
    • Malware(32)
Advanced API Security: OAuth 2.0 and Beyond Ebooks for all member

Advanced API Security: OAuth 2.0 and Beyond

Prabath Siriwardena

Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 Ebooks for all member

Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

Abhishek Hingnikar, Yvonne Wilson

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines Ebooks for all member

Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Mukund Chaudhary, Abhishek Chopra

Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics Ebooks for all member

Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics

David Both

Incident Response Primer Ebook only for VIP member

Incident Response Primer

Ric Messier

CompTIA Linux+ XK0-004 Cert Guide Ebook only for VIP member

CompTIA Linux+ XK0-004 Cert Guide

William J. Rothwell, Ross Brunson

CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, 4th Edition Ebook only for VIP member

CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, 4th Edition

Peter H. Gregory

Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks Ebook only for VIP member

Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks

Nihad A. Hassan

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications Ebook only for VIP member

Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications

Sanjib Sinha

How Cyber Security Can Protect Your Business - A guide for all stakeholders Ebooks for all member

How Cyber Security Can Protect Your Business - A guide for all stakeholders

Christopher Wright

Learn Kali Linux 2019 Ebooks for all member

Learn Kali Linux 2019

Glen D. Singh

Data Breaches: Crisis and Opportunity Ebooks for all member

Data Breaches: Crisis and Opportunity

Sherri Davidoff

Getting Started with Ghidra Ebook only for VIP member

Getting Started with Ghidra

Matthew Berninger, Ric Messier

Foundations of Information Security Ebooks for all member

Foundations of Information Security

Jason Andress

Security+® Practice Tests Ebook only for VIP member

Security+® Practice Tests

Mike Chapple

The Cybersecurity Playbook Ebook only for VIP member

The Cybersecurity Playbook

Allison Cerra

The Customer Revolution in Healthcare: Delivering Kinder, Smarter, Affordable Care for All Ebooks for all member

The Customer Revolution in Healthcare: Delivering Kinder, Smarter, Affordable Care for All

David W Johnson

Elementary Information Security, 3rd Edition Ebook only for VIP member

Elementary Information Security, 3rd Edition

Richard E. Smith

Secure by Design Ebooks for all member

Secure by Design

Daniel Sawano, Dan Bergh Johnsson, Daniel Deogun

Establishing an occupational health & safety management system based on ISO 45001 Ebooks for all member

Establishing an occupational health & safety management system based on ISO 45001

Naeem Sadiq

ISO 27001 controls – A guide to implementing and auditing Ebooks for all member

ISO 27001 controls – A guide to implementing and auditing

Bridget Kenyon

ISO/IEC 38500: A pocket guide, second edition Ebooks for all member

ISO/IEC 38500: A pocket guide, second edition

Alan Calder

Tribe of Hackers Ebooks for all member

Tribe of Hackers

Jennifer Jin, Marcus J. Carey

GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition Ebook only for VIP member

GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition

Ric Messier

Waging Cyber War: Technical Challenges and Operational Constraints Ebooks for all member

Waging Cyber War: Technical Challenges and Operational Constraints

Jacob G. Oakley

Penetration Testing: A guide for business and IT managers Ebooks for all member

Penetration Testing: A guide for business and IT managers

Peter Taylor, Felix Ryan, Tylor Robinson, Gemma Moore, Moinuddin Zaki, Jims Marc

Information Security Risk Management for ISO 27001/ISO 27002, third edition Ebooks for all member

Information Security Risk Management for ISO 27001/ISO 27002, third edition

Alan Calder, Steve Watkins

Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition Ebook only for VIP member

Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition

Omar Santos, Michael Gregg

CompTIA Linux+ Practice Tests, 2nd Edition Ebooks for all member

CompTIA Linux+ Practice Tests, 2nd Edition

Steve Suehring

CISM Certified Information Security Manager Practice Exams Ebook only for VIP member

CISM Certified Information Security Manager Practice Exams

Peter H. Gregory

  • Advanced API Security: OAuth 2.0 and Beyond by Prabath Siriwardena Ebooks for all member

    Advanced API Security: OAuth 2.0 and Beyond

    Author Prabath Siriwardena
    Release Date 2019/12

    Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
  • Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 by Abhishek Hingnikar, Yvonne Wilson Ebooks for all member

    Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

    Author Abhishek Hingnikar , Yvonne Wilson
    Release Date 2019/12

    Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and t....
  • Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines by Mukund Chaudhary, Abhishek Chopra Ebooks for all member

    Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

    Author Mukund Chaudhary , Abhishek Chopra
    Release Date 2019/12

    Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the tim....
  • Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics by David Both Ebooks for all member

    Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics

    Author David Both
    Release Date 2019/12

    Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.This book....
  • Incident Response Primer by Ric Messier Ebook only for VIP member

    Incident Response Primer

    Author Ric Messier
    Release Date 2019/12

    With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
  • CompTIA Linux+ XK0-004 Cert Guide by William J. Rothwell, Ross Brunson Ebook only for VIP member

    CompTIA Linux+ XK0-004 Cert Guide

    Author William J. Rothwell , Ross Brunson
    Release Date 2019/11

    Learn, prepare, and practice for CompTIA Linux+ (XK0-004) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.Master CompTIA Linux+ XK0-004 exam topicsAssess your knowledge with chapter-ending quizzesReview key con....
  • CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, 4th Edition by Peter H. Gregory Ebook only for VIP member

    CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, 4th Edition

    Author Peter H. Gregory
    Release Date 2019/11

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This up-to-date self-study system delivers complete coverage of every topic ....
  • Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks by Nihad A. Hassan Ebook only for VIP member

    Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks

    Author Nihad A. Hassan
    Release Date 2019/11

    Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, re....
  • Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications by Sanjib Sinha Ebook only for VIP member

    Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications

    Author Sanjib Sinha
    Release Date 2019/11

    Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
  • How Cyber Security Can Protect Your Business - A guide for all stakeholders by Christopher Wright Ebooks for all member

    How Cyber Security Can Protect Your Business - A guide for all stakeholders

    Author Christopher Wright
    Release Date 2019/11

    How Cyber Security Can Protect your Business – A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their pe....
  • Learn Kali Linux 2019 by Glen D. Singh Ebooks for all member

    Learn Kali Linux 2019

    Author Glen D. Singh
    Release Date 2019/11

    Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless netwo....
  • Data Breaches: Crisis and Opportunity by Sherri Davidoff Ebooks for all member

    Data Breaches: Crisis and Opportunity

    Author Sherri Davidoff
    Release Date 2019/10

    Protect Your Organization Against Massive Data Breaches and Their ConsequencesData breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines ....
  • Getting Started with Ghidra by Matthew Berninger, Ric Messier Ebook only for VIP member

    Getting Started with Ghidra

    Author Matthew Berninger , Ric Messier
    Release Date 2019/10

    There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze mal....
  • Foundations of Information Security by Jason Andress Ebooks for all member

    Foundations of Information Security

    Author Jason Andress
    Release Date 2019/10

    In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world se....
  • Security+® Practice Tests by Mike Chapple Ebook only for VIP member

    Security+® Practice Tests

    Author Mike Chapple
    Release Date 2019/10

    Ace the CompTIA Security+ exam with over 700 practice exam questions written using the style and format of the Security+ examKey FeaturesGet a detailed breakdown of the type of questions and the exam environmentDiscover a step-by-step process that guides you throug....
  • The Cybersecurity Playbook by Allison Cerra Ebook only for VIP member

    The Cybersecurity Playbook

    Author Allison Cerra
    Release Date 2019/09

    The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
  • The Customer Revolution in Healthcare: Delivering Kinder, Smarter, Affordable Care for All by David W Johnson Ebooks for all member

    The Customer Revolution in Healthcare: Delivering Kinder, Smarter, Affordable Care for All

    Author David W Johnson
    Release Date 2019/09

    Customer-centric, market-driven solutions for fixing America’s broken healthcare system—from one of the industry’s most innovative thought leaders. Healthcare accounts for nearly a fifth of the U.S. economy. Everyone agrees that the current system is broken and in ....
  • Elementary Information Security, 3rd Edition by Richard E. Smith Ebook only for VIP member

    Elementary Information Security, 3rd Edition

    Author Richard E. Smith
    Release Date 2019/09

    An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cyber security and technology. Thoroughly updated with an increase....
  • Secure by Design by Daniel Sawano, Dan Bergh Johnsson, Daniel Deogun Ebooks for all member

    Secure by Design

    Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
    Release Date 2019/09

    Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
  • Establishing an occupational health & safety management system based on ISO 45001 by Naeem Sadiq Ebooks for all member

    Establishing an occupational health & safety management system based on ISO 45001

    Author Naeem Sadiq
    Release Date 2019/09

    This book provides a comprehensive explanation of the detailed requirements of ISO 45001. The author draws out key parts of the Standard, which can often be confusing for non-experts or newcomers to ISO standards, and explains what they mean and how to comply. ....
  • ISO 27001 controls – A guide to implementing and auditing by Bridget Kenyon Ebooks for all member

    ISO 27001 controls – A guide to implementing and auditing

    Author Bridget Kenyon
    Release Date 2019/09

    Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. Show and h....
  • ISO/IEC 38500: A pocket guide, second edition by Alan Calder Ebooks for all member

    ISO/IEC 38500: A pocket guide, second edition

    Author Alan Calder
    Release Date 2019/09

    This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles. Show and hide more
  • Tribe of Hackers by Jennifer Jin, Marcus J. Carey Ebooks for all member

    Tribe of Hackers

    Author Jennifer Jin , Marcus J. Carey
    Release Date 2019/08

    Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
  • GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition by Ric Messier Ebook only for VIP member

    GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition, 2nd Edition

    Author Ric Messier
    Release Date 2019/08

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Fully updated coverage of every topic on the current version of the GSEC exa....
  • Waging Cyber War: Technical Challenges and Operational Constraints by Jacob G. Oakley Ebooks for all member

    Waging Cyber War: Technical Challenges and Operational Constraints

    Author Jacob G. Oakley
    Release Date 2019/08

    Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
  • Penetration Testing: A guide for business and IT managers by Peter Taylor, Felix Ryan, Tylor Robinson, Gemma Moore, Moinuddin Zaki, Jims Marc Ebooks for all member

    Penetration Testing: A guide for business and IT managers

    Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
    Release Date 2019/08

    Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
  • Information Security Risk Management for ISO 27001/ISO 27002, third edition by Alan Calder, Steve Watkins Ebooks for all member

    Information Security Risk Management for ISO 27001/ISO 27002, third edition

    Author Alan Calder , Steve Watkins
    Release Date 2019/08

    Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework f....
  • Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition by Omar Santos, Michael Gregg Ebook only for VIP member

    Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition

    Author Omar Santos , Michael Gregg
    Release Date 2019/07

    In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors' concise, focused appro....
  • CompTIA Linux+ Practice Tests, 2nd Edition by Steve Suehring Ebooks for all member

    CompTIA Linux+ Practice Tests, 2nd Edition

    Author Steve Suehring
    Release Date 2019/07

    The best practice test preparation for the foundational CompTIA Linux+ certification examIf you’re preparing for this all-important exam, turn to CompTIA Linux+ Practice Tests. The book covers the 5 objective domains, PLUS one additional 90-question practice exam, ....
  • CISM Certified Information Security Manager Practice Exams by Peter H. Gregory Ebook only for VIP member

    CISM Certified Information Security Manager Practice Exams

    Author Peter H. Gregory
    Release Date 2019/07

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Don’t Let the Real Test Be Your First Test! Take the current version of the ....
Previous 1 2 3 4 5 6 7 8 9 10 11 ... 49 Next
  • Recommended
  • Privacy Policy
  • About