Kick off your book project in 3 hours! Live workshop on Zoom. You’ll leave with a real book project, progress on your first chapter, and a clear plan to keep going. Saturday, May 16, 2026. Learn more…
The book covers every topic in the latest CISSP exam syllabus, organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the exam without wasting time or money.
This book covers every topic in the latest CISM exam syllabus, approaching topics from the ISACA perspective. It's 325+ pages organized in a format that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISM exam without wasting time or money.
This book covers every topic in the latest CISA exam syllabus, approaching topics from the ISACA perspective. It's 400+ pages, organized in a format following the syllabus that makes it easy to drill down on specific exam domains and concepts at-a-glance, making it an essential exam resource for anyone who aims to prepare for the CISA exam without wasting time or money.
You don't need a massive budget or a team of consultants to build a security program that actually works. Building an Agile Security Program gives startup founders and CTOs a step-by-step, NIST-aligned playbook with 300+ prioritized tasks, runnable automation code, and the practitioner voice of someone who's done it a hundred times.
Official companion guide to the OWASP Juice Shop. Being a web application with a vast number of intended security vulnerabilities, the OWASP Juice Shop is supposed to be the opposite of a best practice or template application for web developers: It is an awareness, training, demonstration and exercise tool for security risks in modern web apps.
Most universities have IT policies. Few have a formal strategy behind them. This guide uses data from 410 institutions to show higher education leaders where the sector's policy gaps are, how the unique dynamics of academic culture shape security programs differently than corporate or government environments, and how to close those gaps systematically.
Over the last few years, applications’ technology stack has changed rapidly. Web Application Advanced Hacking (WAAH) shares advanced techniques used by ethical hackers to carry out a thorough penetration test and security audit for modern web applications in a practical, hands-on approach.
Transform your cybersecurity from a necessary expense into a powerful engine for business expansion and market differentiation. This guide reveals how fractional executive leadership provides the enterprise-level strategy needed to build customer trust, navigate compliance, and outpace the competition. Stop just protecting your business and start using security to propel it forward.
Uncover the advanced exploits missed by standard scans. This definitive guide dissects sophisticated 2025 vulnerabilities in injection, authentication/authorization (JWT/SAML/OAuth), SSRF, deserialization, APIs (REST/GraphQL/gRPC), and cloud environments. Essential technical knowledge for serious security professionals.
"Explore the synergy of AI swarm technology""Integrating Swarm Intelligence and Human Ingenuity: A Vision of Tomorrow's World" Delve into a world where AI enhances human capabilities, transforming industries and society. Uncover the secrets of this groundbreaking tech and its profound impact. A future where AI collaborates with us awaits.
Das Buch behandelt alle Themen des aktuellen CISSP-Prüfungslehrplans in einem Format, das es ermöglicht, spezifische Prüfungsdomänen und Konzepte auf einen Blick zu vertiefen, wodurch es sich zu einer unverzichtbaren Prüfungsressource für alle entwickelt, die sich ohne Zeit- und Geldverschwendung auf die Prüfung vorbereiten möchten.

Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.

Hello! I'm Tony Robinson, a senior security analyst and rule writer on the Proofpoint Emerging Threats team. I write rules for the ETOPEN and ETPRO rulesets. My book will teach you about the ins and outs of Suricata, rules and rule writing in general, why the IDS software behaves a certain way, and how to get the most out of your Suricata deployments.
Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more. The code is presented to the reader ready to compile and analyze on their own.
The premise of this book is to provide students a hands-on, go-to resource for building a secure, customizable lab environment in order to enable their own specific pursuits.