rssHome » Security and Encryption

Nmap: Network Exploration and Security Auditing Cookbook – Secon...

eBook Details:

  • Paperback: 416 pages
  • Publisher: WOW! eBook; 2nd Revised edition (May 26, 2017)
  • Language: English
  • ISBN-10: 1786467453
  • ISBN-13: 978-1786467454

eBook Description:

Nmap: Network Exploration and Security Auditing Cookbook, 2nd Edition: Over 100 practical recipes related to network and application security auditing using the powerful Nmap

CLICK TO DOWNLOAD

Cryptography and Network Security: Principles and Practice, Global Edi...

eBook Details:

  • Hardcover: 768 pages
  • Publisher: Pearson; 7th edition (October 5, 2016)
  • Language: English
  • ISBN-10: 1292158581
  • ISBN-13: 978-1292158587

eBook Description:

Cryptography and Network Security: Principles and Practice, Global Edition, 7th Edition: The Principles and Practice of Cryptography and Network Security

CLICK TO DOWNLOAD

Enterprise Cloud Security and Governance

eBook Details:

  • Paperback: 410 pages
  • Publisher: WOW! eBook (January 9, 2018)
  • Language: English
  • ISBN-10: 1788299558
  • ISBN-13: 978-1788299558

eBook Description:

Enterprise Cloud Security and Governance: Efficiently set data protection and privacy principles and build a resilient cloud architecture to tackle data disasters with ease

CLICK TO DOWNLOAD

Security Automation with Ansible 2

eBook Details:

  • Paperback: 364 pages
  • Publisher: WOW! eBook (December 13, 2017)
  • Language: English
  • ISBN-10: 1788394518
  • ISBN-13: 978-1788394512

eBook Description:

Security Automation with Ansible 2: : Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

CLICK TO DOWNLOAD

Attacking Network Protocols: A Hacker’s Guide to Capture, Analys...

eBook Details:

  • Paperback: 336 pages
  • Publisher: WOW! eBook; 1st edition (December 8, 2017)
  • Language: English
  • ISBN-10: 1593277504
  • ISBN-13: 978-1593277505

eBook Description:

Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation

CLICK TO DOWNLOAD