Recommended Security Book from Developer Fusion https://www.developerfusion.com/t/security/books/view/recommended/ Recommended Security Book from Developer Fusion http://www.rssboard.org/rss-specification en-GB Wed, 14 Dec 2011 15:46:00 GMT The Tangled Web: A Guide to Securing Modern Web Applications "Thorough and comprehensive coverage from one of the foremost experts in browser security."--Tavis Ormandy, Google Inc.Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. http://www.developerfusion.com/book/134610/the-tangled-web-a-guide-to-securing-modern-web-applications/ http://www.developerfusion.com/book/134610/the-tangled-web-a-guide-to-securing-modern-web-applications/ Wed, 14 Dec 2011 15:46:00 GMT James Crowley CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide is an update to the top-selling SY0-201 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version.Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. http://www.developerfusion.com/book/134575/comptia-security-get-certified-get-ahead-sy0301-study-guide/ http://www.developerfusion.com/book/134575/comptia-security-get-certified-get-ahead-sy0301-study-guide/ Tue, 13 Dec 2011 04:56:00 GMT James Crowley Metasploit: A Penetration Tester's Guide The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. http://www.developerfusion.com/book/122048/metasploit-a-penetration-testers-guide/ http://www.developerfusion.com/book/122048/metasploit-a-penetration-testers-guide/ Mon, 11 Jul 2011 16:07:00 GMT James Crowley Android Forensics: Investigation, Analysis and Mobile Security for Google Android The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. http://www.developerfusion.com/book/130311/android-forensics-investigation-analysis-and-mobile-security-for-google-android/ http://www.developerfusion.com/book/130311/android-forensics-investigation-analysis-and-mobile-security-for-google-android/ Fri, 14 Oct 2011 04:21:00 GMT James Crowley BackTrack 4: Assuring Security by Penetration Testing Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. http://www.developerfusion.com/book/117952/backtrack-4-assuring-security-by-penetration-testing/ http://www.developerfusion.com/book/117952/backtrack-4-assuring-security-by-penetration-testing/ Sat, 16 Apr 2011 22:50:00 GMT James Crowley Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. http://www.developerfusion.com/book/94194/gray-hat-hacking-the-ethical-hackers-handbook-3rd-edition/ http://www.developerfusion.com/book/94194/gray-hat-hacking-the-ethical-hackers-handbook-3rd-edition/ Tue, 01 Feb 2011 12:33:00 GMT James Crowley Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. http://www.developerfusion.com/book/94264/web-application-obfuscation-wafsevasionfiltersalertobfuscation/ http://www.developerfusion.com/book/94264/web-application-obfuscation-wafsevasionfiltersalertobfuscation/ Tue, 01 Feb 2011 15:04:00 GMT James Crowley MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring *Master every topic on Microsoft’s new MCTS 70-680 exam. *Assess your knowledge and focus your learning. *Get the practical workplace knowledge you need!Start-to-finish MCTS 70-680 preparation from top Microsoft technology consultant, trainer, and author Don Poulton!Master every MCTS 70-680 topic! *Windows 7 installation, upgrades, and deployment *User and application migration *Windows 7 deployment http://www.developerfusion.com/book/122478/mcts-70680-cert-guide-microsoft-windows-7-configuring/ http://www.developerfusion.com/book/122478/mcts-70680-cert-guide-microsoft-windows-7-configuring/ Mon, 18 Jul 2011 20:02:00 GMT James Crowley VMware ESXi: Planning, Implementation, and Security VMware ESXi is the easiest way to get started with virtualization -- and it's free. It allows administrators to consolidate their applications onto fewer servers and start saving money through reduced hardware, power, cooling, and administration costs. VMware ESXi has been optimized and tested to run even their most resource-intensive applications and databases with minimal performance overhead. http://www.developerfusion.com/book/94282/vmware-esxi-planning-implementation-and-security/ http://www.developerfusion.com/book/94282/vmware-esxi-planning-implementation-and-security/ Tue, 01 Feb 2011 16:34:00 GMT James Crowley Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. http://www.developerfusion.com/book/94220/malware-analysts-cookbook-and-dvd-tools-and-techniques-for-fighting-malicious-code/ http://www.developerfusion.com/book/94220/malware-analysts-cookbook-and-dvd-tools-and-techniques-for-fighting-malicious-code/ Tue, 01 Feb 2011 12:59:00 GMT James Crowley