Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers...
Cuckoo Malware Analysis
Analyze malware using Cuckoo Sandbox
Learn how to analyze malware in a straightforward way with minimum technical skills
Understand the risk of the rise of document-based malware
Enhance your malware analysis concepts through illustrations, tips and tricks,...