Android Security Internals: An I...

...Depth Guide to Android's Security ArchitectureThere are more than one billion Android devices in use today, each one a potent ...

Details »
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system f ...

Details »
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a com ...

Details »
Real-World Bug Hunting: A Field Guide to Web Hacking

Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding software bugs ...

Details »
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bu ...

Details »
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues ...

Details »
Malware Data Science: Attack Detection and Attribution

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visuali ...

Details »
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis top ...

Details »
Serious Cryptography: A Practical Introduction to Modern Encryption

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without ...

Details »
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s ...

Details »