Threat Modeling: Designing for Security

  • Length: 624 pages
  • Publication Date: 2014-02-17

The Browser Hacker’s Handbook

  • Length: 648 pages
  • Publication Date: 2014-03-17

Cuckoo Malware Analysis

  • Length: 142 pages
  • Publication Date: 2013-10-16

Malware Forensics Field Guide for Linux Systems

  • Length: 616 pages
  • Publication Date: 2014-01-03

Applied Network Security Monitoring

  • Length: 496 pages
  • Publication Date: 2013-12-19

Data-Driven Security: Analysis, Visualization and Dashboards

  • Length: 352 pages
  • Publication Date: 2014-02-24

SELinux System Administration

  • Length: 120 pages
  • Publication Date: 2013-09-24
4.3

Pairing-Based Cryptography: Pairing 2013

  • Length: 264 pages
  • Publication Date: 2014-02-05

Kali Linux Social Engineering

  • Length: 84 pages
  • Publication Date: 2013-12-24
1.4

Mobile Security: How to Secure, Privatize, and Recover Your Devices

  • Length: 242 pages
  • Publication Date: 2013-09-10
4.3

Large-Scale Data Analytics

  • Length: 290 pages
  • Publication Date: 2014-01-22

Cloud Storage Forensics

  • Length: 208 pages
  • Publication Date: 2013-12-25
4.6