Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book...
Windows 10 Troubleshooting (Windows Troubleshooting Series)
Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...
Learning Linux Binary Analysis
Grasp the intricacies of the ELF binary format of UNIX and Linux
Design tools for reverse engineering and binary forensic analysis
Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...
Data-Driven Security: Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...
Information Security : Principles and Practice Your expert guide to information security
As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...
|Result Page: 12 11 10 9 8 7 6 5 4 3 2 |