The Browser Hacker’s Handbook
Author: Wade Alcorn, Christian Frichot, Michele Orru Michele Orru, from the Group’s Fort Consult Division, has co-authored The Browser Hacker’s Handbook, with former NCC Group security consultant Wade Alcorn. The book gives practical understanding of hacking the everyday web browser. It contains expert advice on topics such as ARP spoofing, social engineering, and phishing to […]
SQL Server Security
Author: Bill Grindlay , David Litchfield Bill Grindlay, principal software architect at NCC Group, has co-authored SQL Server Security. The book provides in-depth coverage of the installation, administration, and programming of secure Microsoft SQL Server environments and applications. It covers some of the latest techniques such as Installing and configuring your SQL Server environment for […]
The Database Hacker’s Handbook
Author: David Litchfield, Chris Anley, John Heasman, Bill Grindlay NCC Group’s Bill Grindlay, principal software architect and Chris Anley, chief technical scientist, has co-authored The Database Hacker’s Handbook. The book helps readers to understand how to break into and defend the seven most popular database servers. It contains expert advice on topics such as identifying […]
Social Engineering Penetration Testing
Author: Gavin Watson, Richard Ackroyd, Andrew Mason Gavin Watson and Richard Ackroyd, security engineers at RandomStorm, part of NCC Group, have co-authored a book with former RandomStorm engineer Andrew Mason. The book includes information on practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. Click here for […]
iOS Application Security: The Definitive Guide for Hackers and Developers
Author: David Thiel This book is the definitive guide for hackers and developers allowing readers to understand and eliminate security holes in iOS Application Security. Former NCC Group security consultant, David Thiel, authored this book, which includes information about common iOS coding mistakes that create serious security problems and how you can find and fix […]
The Mobile Application Hacker’s Handbook
Author: Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse. Ollie Whitehouse, technical director at NCC Group, has co-authored The Mobile Application Hacker’s Handbook. The book helps readers to understand how to secure mobile phones by approaching the issue from a hacker’s point of view. It contains expert guidance on topics such as discovering and exploiting […]
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
Author(s): Chris Anley, John Heasman, Felix Lindner and Gerardo Richarte. The Shellcoder’s Handbook takes a detailed look at why security holes appear, how to discover them and how to close them so that they can’t be exploited. In this revised 2007 second edition, many new exploitation techniques are explored that were not discovered at the time […]
Building Systems from Commercial Components
Author: Kurt Wallnau, Scott Hissam, Robert Seacord Robert Seacord, principal security consultant at NCC Group, has co-authored Building Systems from Commercial Components. The book describes a number of proven techniques, as well as much-needed guidance on how to build component-based systems in a real working environment. Click here for more information.
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
Author: Robert Seacord, Daniel Plakosh, Grace Lewis Robert Seacord, principal security consultant at NCC Group, has written a book about Modernizing Legacy Systems. The book uses an extensive real-world case study (based on the modernisation of a 30-year- old retail system) to show how modernising legacy systems can deliver significant business value to any organisation. […]
Secure Coding in C and C++
Author: Robert Seacord Robert Seacord, principal security consultant at NCC Group, has written a book about secure coding in C and C++. Readers will be able to learn the root causes of software vulnerabilities and how to avoid them. The book covers some technical details on how to improve the overall security of any C/C++ […]