Ubuntu using hacking

Ubuntu using hacking. The name of this book is Ubuntu Ushing Hacking. This book write is a Indian author Meet...

Cyber Insecurity

Cyber Insecurity. Cyber security is a completely man made phenomenon, which has become the most complex threat to modern societies...

Defensive Security Handbook

Defensive Security Handbook: Best Practices for Securing Infrastructure. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks,...

Computer Security, 3rd Edition

Computer Security, 3rd Edition. A completely up-to-date resource on computer securityAssuming no previous experience in the field of computer security,...

Personal Cybersecurity

Personal Cybersecurity: How to Avoid and Recover from Cybercrime. Discover the most prevalent cyber threats against individual users of all...

Real-Time Embedded Systems

Real-Time Embedded Systems. Offering comprehensive coverage of the convergence of real-time embedded systems scheduling, resource access control, software design and...

DNS Security Management

DNS Security Management (IEEE Press Series on Networks and Services Management). An advanced Domain Name System (DNS) security resource that...