Authors: Gavin Watson, Andrew Mason, and Richard Ackroyd Pages: 390 Publisher: Syngress ISBN: 0124201245 Introduction We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets - regularly take advantage of this fact to gain a foothold into computer systems and networks.
Authors: Aditya Sood, Richard Enbody Pages: 158 Publisher: Syngress ISBN: 0128006048 Introduction Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe.
Author: Leighton Johnson Pages: 352 Publisher: Syngress ISBN: 159749996X Introduction In this day and age, it's only a matter of time when an organization's systems and networks will be breached by cyber attackers.
Author: Georgia Weidman Pages: 528 Publisher: No Starch Press ISBN: 1593275641 Introduction There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start.
This guide outlines how your enterprise can leverage mobility to gain real-time access to vital business information and meet consumer needs.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.