Keeping data, computers, and networks protected

Browse all titles

Our security titles provide real-world processes and solutions to computer, information, network, and cyber-security. They cover tools and techniques used for penetration testing/ethical hacking, incident preparedness and response, data security and investigations, risk management, cyber defense, and more.

Featured Author

  • New Content Item

    Jacob Oakley

    Jacob G. Oakley spent over seven years in the US Marines and was one of the founding members of the operational arm of the Marine Corps Forces Cyberspace Command at NSA, Ft. Meade. He left that unit as the senior Marine Corps operator and a division technical lead. After his enlistment he wrote and taught an advanced computer operations course, eventually returning back to mission support at Ft. Meade. He later left government contracting to do threat emulation and red teaming at a private company for commercial clients, serving as principal penetration tester and director of penetration testing and cyber operations. He is currently working as a cyber SME for a government customer. He completed his doctorate in IT at Towson University, researching and developing offensive cybersecurity methods and is the technical reviewer of the book Cyber Operations, second edition, by Mike O’Leary.

Meet the Editor

    • New Content Item

      Susan McDermott

      Executive Editor
      Security, Big Data, Cloud/Networking, Enterprise Software

      Tel.: +1 212-620-8055

Why Shop on Apress.com?

The books in our Apress Shop come with free worldwide shipping for print copies, and our eBooks can be read on any device.