Create account Create free account
Sign in
  • Home
    • Business
    • Career development
    • Data
    • Design
    • Hardware
    • Math Science Engineering
    • Other
    • Security
    • Software Development
    • System Administration
    • Travel Hobbies
    • Web Mobile
    • Recommendation
    • Trending Now

eBook Reading

Search Button
All Ebooks
Free Ebooks
Premium Ebooks
  • Title: A to Z
  • Title: Z to A
  • Release Date: Newest to Oldest
  • Release Date: Oldest to Newest
  • View ↓
  • View ↑

Search Results

211 - 240 of 1455 results

Filter
Categories
  • All (35603)
  • Security(1455)
    • Security Operations(154)
    • Security Certifications(269)
    • Governance(66)
    • Digital Forensics(104)
    • Application Security(45)
    • Penetration Testing Ethical Hacking(141)
    • Network Security(98)
    • Frameworks And Standards(90)
    • Security Engineering(66)
    • Malware(32)
Kali Linux - An Ethical Hacker's Cookbook - Second Edition Ebooks for all member

Kali Linux - An Ethical Hacker's Cookbook - Second Edition

Himanshu Sharma

Securing Network Infrastructure Ebook only for VIP member

Securing Network Infrastructure

Sagar Rahalkar, Sairam Jetty

Framing the Threat Ebooks for all member

Framing the Threat

Imke Köhler

Offline Ebooks for all member

Offline

Soren Kenner, Imran Rashid

CASP+ CompTIA Advanced Security Practitioner Study Guide, 3rd Edition Ebook only for VIP member

CASP+ CompTIA Advanced Security Practitioner Study Guide, 3rd Edition

Michael Gregg, Jeff T. Parker

Digital Forensics Basics: A Practical Guide Using Windows OS Ebook only for VIP member

Digital Forensics Basics: A Practical Guide Using Windows OS

Nihad A. Hassan

Practical Security Ebook only for VIP member

Practical Security

Roman Zabicki

Hands-On Application Penetration Testing with Burp Suite Ebook only for VIP member

Hands-On Application Penetration Testing with Burp Suite

Riyaz Ahemed Walikar, Dhruv Shah, Carlos A. Lozano

Conversations in Cyberspace Ebooks for all member

Conversations in Cyberspace

Giulio D'Agostino

The Generation Myth Ebooks for all member

The Generation Myth

Dr. Michael J. Urick

CompTIA PenTest+ Cert Guide Ebooks for all member

CompTIA PenTest+ Cert Guide

Ron Taylor, Omar Santos

Info We Trust Ebooks for all member

Info We Trust

RJ Andrews

(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests Ebook only for VIP member

(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests

David Seidl, Mike Chapple

ISO 14001 Step by Step - A Practical Guide Ebooks for all member

ISO 14001 Step by Step - A Practical Guide

Naeem Sadiq, Asif Hayat Khan

Becoming the Hacker Ebook only for VIP member

Becoming the Hacker

Adrian Pruteanu

Hands-On Penetration Testing with Python Ebooks for all member

Hands-On Penetration Testing with Python

Furqan Khan

Mastering Kali Linux for Advanced Penetration Testing - Third Edition Ebooks for all member

Mastering Kali Linux for Advanced Penetration Testing - Third Edition

Robert Beggs, Vijay Kumar Velu

SHRM-CP/SHRM-SCP Certification All-in-One Exam Guide Ebook only for VIP member

SHRM-CP/SHRM-SCP Certification All-in-One Exam Guide

William D. Kelly, William H. Truesdell, Dory Willer

Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition, 2nd Edition Ebook only for VIP member

Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition, 2nd Edition

Lee Reiber

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software Ebooks for all member

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Maciej Machulak, Michael Schwartz

Reducing MTTD for High-Severity Incidents Ebook only for VIP member

Reducing MTTD for High-Severity Incidents

Jordan Pritchard, Ramin Keene, Rodney Lester, Jay Holler, Michael Kehoe, Tammy B

Understanding Security Issues Ebooks for all member

Understanding Security Issues

Stanley Siegel, Chris Williams, Scott Donaldson

Secure Sensor Cloud Ebook only for VIP member

Secure Sensor Cloud

Vimal Kumar, Amartya Sen, Sanjay Madria,

Microsoft System Center Data Protection Manager Cookbook Ebooks for all member

Microsoft System Center Data Protection Manager Cookbook

Patrick Lownds, Charbel Nemnom

Learning Android Forensics - Second Edition Ebook only for VIP member

Learning Android Forensics - Second Edition

Rohit Tamma, Donnie Tindall, Oleg Skulkin

CISSP Practice Exams, Fifth Edition, 5th Edition Ebooks for all member

CISSP Practice Exams, Fifth Edition, 5th Edition

Jonathan Ham, Shon Harris

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Ebook only for VIP member

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Sanjib Sinha

Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit Ebook only for VIP member

Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit

Sagar Rahalkar

Understanding Government Contract Law, 2nd Edition Ebooks for all member

Understanding Government Contract Law, 2nd Edition

Terrence M. O'Connor

Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers Ebooks for all member

Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers

Alan Calder

  • Kali Linux - An Ethical Hacker's Cookbook - Second Edition by Himanshu Sharma Ebooks for all member

    Kali Linux - An Ethical Hacker's Cookbook - Second Edition

    Author Himanshu Sharma
    Release Date 2019/03

    Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect....
  • Securing Network Infrastructure by Sagar Rahalkar, Sairam Jetty Ebook only for VIP member

    Securing Network Infrastructure

    Author Sagar Rahalkar , Sairam Jetty
    Release Date 2019/03

    Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
  • Framing the Threat by Imke Köhler Ebooks for all member

    Framing the Threat

    Author Imke Köhler
    Release Date 2019/03

    There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat,....
  • Offline by Soren Kenner, Imran Rashid Ebooks for all member

    Offline

    Author Soren Kenner , Imran Rashid
    Release Date 2019/02

    Authors Imran Rashid and Soren Kenner have sparked an international debate by revealing the “mind hacks” Facebook, Apple, Google, and Instagram use to get you and your children hooked on their products. In Offline, they deliver an eye-opening research-based journey....
  • CASP+ CompTIA Advanced Security Practitioner Study Guide, 3rd Edition by Michael Gregg, Jeff T. Parker Ebook only for VIP member

    CASP+ CompTIA Advanced Security Practitioner Study Guide, 3rd Edition

    Author Michael Gregg , Jeff T. Parker
    Release Date 2019/02

    Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study toolsThe CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the ex....
  • Digital Forensics Basics: A Practical Guide Using Windows OS by Nihad A. Hassan Ebook only for VIP member

    Digital Forensics Basics: A Practical Guide Using Windows OS

    Author Nihad A. Hassan
    Release Date 2019/02

    Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gat....
  • Practical Security by Roman Zabicki Ebook only for VIP member

    Practical Security

    Author Roman Zabicki
    Release Date 2019/02

    Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
  • Hands-On Application Penetration Testing with Burp Suite by Riyaz Ahemed Walikar, Dhruv Shah, Carlos A. Lozano Ebook only for VIP member

    Hands-On Application Penetration Testing with Burp Suite

    Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
    Release Date 2019/02

    Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
  • Conversations in Cyberspace by Giulio D'Agostino Ebooks for all member

    Conversations in Cyberspace

    Author Giulio D'Agostino
    Release Date 2019/02

    Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world.The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some....
  • The Generation Myth by Dr. Michael J. Urick Ebooks for all member

    The Generation Myth

    Author Dr. Michael J. Urick
    Release Date 2019/02

    Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
  • CompTIA PenTest+ Cert Guide by Ron Taylor, Omar Santos Ebooks for all member

    CompTIA PenTest+ Cert Guide

    Author Ron Taylor , Omar Santos
    Release Date 2019/01

    Learn, prepare, and practice for CompTIA Pentest+ PT0-001 exam success with this CompTIA Cert Guide from Pearson IT Certification, a leader in IT Certification.Master CompTIA Pentest+ PT0-001 exam topicsAssess your knowledge with chapter-ending quizzesReview key co....
  • Info We Trust by RJ Andrews Ebooks for all member

    Info We Trust

    Author RJ Andrews
    Release Date 2019/01

    How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.Creating Info We Trust is a craft that puts the world into forms tha....
  • (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests by David Seidl, Mike Chapple Ebook only for VIP member

    (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests

    Author David Seidl , Mike Chapple
    Release Date 2019/01

    Smarter, faster prep for the SSCP exam(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests is the only (ISC)2-endorsed set of questions for the SSCP exam. With SSCP certification, you will meet Department of Defense requirements for entry-lev....
  • ISO 14001 Step by Step - A Practical Guide by Naeem Sadiq, Asif Hayat Khan Ebooks for all member

    ISO 14001 Step by Step - A Practical Guide

    Author Naeem Sadiq , Asif Hayat Khan
    Release Date 2019/01

    Take the first steps to ISO 14001 certification with this practical overview. This easy-to-follow book provides practical advice and sample documents to help you understand how to achieve compliance with ISO 14001:2015, the international standard for an EMS (envir....
  • Becoming the Hacker by Adrian Pruteanu Ebook only for VIP member

    Becoming the Hacker

    Author Adrian Pruteanu
    Release Date 2019/01

    Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.Key FeaturesBuilds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Exa....
  • Hands-On Penetration Testing with Python by Furqan Khan Ebooks for all member

    Hands-On Penetration Testing with Python

    Author Furqan Khan
    Release Date 2019/01

    Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development . Make robust and powerful cybersecurity tools with Python W....
  • Mastering Kali Linux for Advanced Penetration Testing - Third Edition by Robert Beggs, Vijay Kumar Velu Ebooks for all member

    Mastering Kali Linux for Advanced Penetration Testing - Third Edition

    Author Robert Beggs , Vijay Kumar Velu
    Release Date 2019/01

    A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain....
  • SHRM-CP/SHRM-SCP Certification All-in-One Exam Guide by William D. Kelly, William H. Truesdell, Dory Willer Ebook only for VIP member

    SHRM-CP/SHRM-SCP Certification All-in-One Exam Guide

    Author William D. Kelly , William H. Truesdell , Dory Willer
    Release Date 2018/12

    Take the SHRM-Certified Professional (SHRM-CP) and SHRM-Senior Certified Professional (SHRM-SCP) exams with complete confidenceThis integrated exam preparation system delivers 100% coverage of all topics for both the SHRM-Certified Professional (SHRM-CP) and SHRM-S....
  • Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition, 2nd Edition by Lee Reiber Ebook only for VIP member

    Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition, 2nd Edition

    Author Lee Reiber
    Release Date 2018/12

    Master the tools and techniques of mobile forensic investigationsConduct mobile forensic investigations that are legal, ethical, and highly effective using the detailed information contained in this practical guide. Mobile Forensic Investigations: A Guide to Eviden....
  • Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software by Maciej Machulak, Michael Schwartz Ebooks for all member

    Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

    Author Maciej Machulak , Michael Schwartz
    Release Date 2018/12

    Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate y....
  • Reducing MTTD for High-Severity Incidents by Jordan Pritchard, Ramin Keene, Rodney Lester, Jay Holler, Michael Kehoe, Tammy B Ebook only for VIP member

    Reducing MTTD for High-Severity Incidents

    Author Jordan Pritchard , Ramin Keene , Rodney Lester , Jay Holler , Michael Kehoe , Tammy B
    Release Date 2018/12

    For companies such as Amazon, Dropbox, and Gremlin, the term high severity incident (SEV) signifies drops in network availability, product feature issues, data loss, revenue loss, and security risks. These high-impact bugs occur when coding, automation, testing, an....
  • Understanding Security Issues by Stanley Siegel, Chris Williams, Scott Donaldson Ebooks for all member

    Understanding Security Issues

    Author Stanley Siegel , Chris Williams , Scott Donaldson
    Release Date 2018/12

    With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and busine....
  • Secure Sensor Cloud by Vimal Kumar, 
            Amartya Sen, 
            Sanjay Madria, 
         Ebook only for VIP member

    Secure Sensor Cloud

    Author Vimal Kumar , Amartya Sen , Sanjay Madria
    Release Date 2018/12

    The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time. It ....
  • Microsoft System Center Data Protection Manager Cookbook by Patrick Lownds, Charbel Nemnom Ebooks for all member

    Microsoft System Center Data Protection Manager Cookbook

    Author Patrick Lownds , Charbel Nemnom
    Release Date 2018/12

    Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM Key FeaturesAdapt to the modern data center design challenges and improve storage efficiency Effective recipes to help you create your own robust architectural designs S....
  • Learning Android Forensics - Second Edition by Rohit Tamma, Donnie Tindall, Oleg Skulkin Ebook only for VIP member

    Learning Android Forensics - Second Edition

    Author Rohit Tamma , Donnie Tindall , Oleg Skulkin
    Release Date 2018/12

    A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source foren....
  • CISSP Practice Exams, Fifth Edition, 5th Edition by Jonathan Ham, Shon Harris Ebooks for all member

    CISSP Practice Exams, Fifth Edition, 5th Edition

    Author Jonathan Ham , Shon Harris
    Release Date 2018/11

    Fully updated coverage of the 2018 CISSP exam, including 1250+ in-depth practice questionsTake the 2018 version of the challenging CISSP exam with confidence using this up-to-date, exam-focused study resource. Designed as a companion to CISSP All-in-One Exam Guide,....
  • Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues by Sanjib Sinha Ebook only for VIP member

    Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

    Author Sanjib Sinha
    Release Date 2018/11

    Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux....
  • Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit by Sagar Rahalkar Ebook only for VIP member

    Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit

    Author Sagar Rahalkar
    Release Date 2018/11

    Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanni....
  • Understanding Government Contract Law, 2nd Edition by Terrence M. O'Connor Ebooks for all member

    Understanding Government Contract Law, 2nd Edition

    Author Terrence M. O'Connor
    Release Date 2018/11

    This updated classic offers clear and concise explanations of the basic legal concepts of government contract law for professionals at any stage of their career. Written in straightforward language for contracting officers, contract administrators, contractors,....
  • Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers by Alan Calder Ebooks for all member

    Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers

    Author Alan Calder
    Release Date 2018/11

    This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. Show and hide more
Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 ... 49 Next
  • Recommended
  • Privacy Policy
  • About