Penetration Testing

Penetration Testing evaluates computer and network security. An attack is simulated from an external or internal point of view.

Buy Books

Secure Design

Secure Design in Software Security concerns business logic and security controls, authentication and access control as well as architecture and datastores.

Buy Books

Malware Analysis

To gain an understanding of a certain piece of malware is the first step in the fight against malicious software. Malware is a fast-growing threat.

Buy Books

Fury over UK military bid to ban book about Afghanistan for citing #WikiLeaks bit.ly/1iwYeg3 More: amazon.com/An-Intimate-Wa… Retweeted by Michael Dwyer 2 weeks ago

RT @naomirwolf: When Google Met #WikiLeaks presents the story of #Assange and Schmidt's encounter orbooks.com/wp-content/upl… 2 weeks ago

How quickly will they start charging the usual price. #marxism #exploit pic.twitter.com/qxeGwEA3oc 2 weeks ago

#exploitdb [remote] - Vtiger Install Unauthenticated Remote Command Execution: Vtiger Install Unauthe... bit.ly/1qyBi4d #exploit Retweeted by BL▲CK Man® 2 weeks ago

Majority Of Users Have Not Received Security Awareness Training, Study Says | #infosec sco.lt/64kUs5 2 weeks ago

:: @schneierblog states that the #Heartbleed issue is "catastrophic" and an 11 out of 10 bit.ly/1oQJotz #InfoSec 2 weeks ago

Securing Passwords with Bcrypt Hashing Function thehackernews.com/2014/04/securi… via @TheHackersNews #Security 2 weeks ago

New {blog} post: The 'Heartbleed' Security Flaw - Are You Affected? expta.com/2014/04/the-he… #Security #HeartbleedVirus Retweeted by Andrew Higginbotham 2 weeks ago