Skip to main content


Penetration Testing A Hands On Introduction

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite.

The PHP Anthology Tips Tricks & Hacks

The PHP Anthology: 101 Essential Tips, Tricks & Hacks, 2nd Edition is a collection of powerful PHP 5 solutions to the most common programming problems. Featuring best-practice code and a commonsense approach to development, this book includes coverage of:Manage errors gracefully. Build functional forms, tables, and SEO-friendly URLs. Reduce load time with client- and server-side caching. Produce and utilize web services with XML. Secure your site using access control systems. Easily work with files, emails, and images. And much more.

Problematic Use Of Mobile Phones

Problematic use of mobile phones is an abnormal, but relatively widespread form of consumer consumption which has a range of negative social and financial consequences for many individuals. It is defined here as “a person’s perceived tendency to chronically use mobile phone services in excess of their needs and resources”. Although substantial research exists on problematic behavior in the tangible goods sector, our understanding of problematic consumption of a service-based ‘good’ like mobile phone use is limited.

Best Practices for Securing E-Commerce

An e-commerce solution comprises the software, hardware, processes, services, and methodology that enable and support these transactions. Merchants choosing to sell their goods and services online have a number of methods to consider. Merchants may also choose to maintain different levels of control and responsibility for managing the supporting information technology infrastructure. For example, a merchant may choose to manage all networks and servers in-house, outsource management of all systems and infrastructure to hosting providers and/or e-commerce payment processors.

MySQL For The Internet Of Things

This eBook introduces the problems facing Internet of Things developers and explores current technologies and techniques to help you manage, mine, and make sense of the data being collected through the use of the world’s most popular database on the Internet - MySQL. The IoT is poised to change how we interact with and perceive the world around us, and the possibilities are nearly boundless. As more and more connected devices generate data, we will need to solve the problem of how to collect, store, and make sense of IoT data by leveraging the power of database systems.

High Performance Cloud Auditing

This eBook mainly focuses on cloud security and high performance computing for cloud auditing. The eBook discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.

Understanding Behavioural Detection Of AVs

Antivirus products nowadays almost always come bundled with some forms of proactive detection based on application behaviours. Many antivirus products in the market claim that they can detect and stop new and unknown threats with minimum use of traditional byte matching signatures. However, behavioural based detection is not the ultimate solution and can be circumvented. A few companies carry out independent tests to rate the capabilities of the antivirus to stop new and unknown threats.