Overview :Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most ce... Read More
Overview :Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals ho... Read More
Overview :The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations... Read More
Overview :Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to an... Read More
Overview :The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-... Read More
Overview :Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information... Read More
Overview :This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The F... Read More
Overview :Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write q... Read More
Overview :Bundles and Virtual Lab Access are available on the Ordering Options tab. For questions about this title, please contact ISSAsupport@jblearn... Read More
Overview :The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assist... Read More
Overview :"Tribe of Hackers" is a collection of insights from dozens of the world's top security experts. Lesley Carhart, Ming Chow, Robert M. Lee, Da... Read More
Overview :Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry t... Read More
Overview :Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting h... Read More
Overview :Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and unde... Read More