iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system f ...

Details »
Android Security Internals: An I...

...Depth Guide to Android's Security ArchitectureThere are more than one billion Android devices in use today, each one a potent ...

Details »
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a com ...

Details »
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most or ...

Details »
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topi ...

Details »
The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understan ...

Details »
Serious Cryptography: A Practical Introduction to Modern Encryption

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without ...

Details »
The Shellcoder's Handbook: Discovering and Exploiting Security Holes

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new con ...

Details »
Practical Malware Analysis: The Hand...

...On Guide to Dissecting Malicious Software

Details »
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s ...

Details »