Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware [Monnappa K A] on Amazon.com. *FREE* shipping on qualifying offers.
Books
In this section we showcase some books that could be of interest to IT-security professionals, tech enthusiasts and even sci-fi fans. There are (non-affiliate) links that let you buy each book from Amazon.
Hacking Complete Beginner’s Practical Guide
Hacking: 2 Books In 1 Bargain: The Complete Beginner’s Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner’s Complete … Hacking and Pen. Testing (English Edition)
Have You Always Wondered If Hacking Has Any Benefits?Are You Interested In Penetration Testing To Examine Security Strength?Then I Invite You To Take Advantage Of My Limited Time Bundle 2 in 1 Discount!Cyber crime is the biggest threat that every organization on the planet faces today! And it…
Digging in the deep web: Exploring the dark side of the web
Digging in the deep web: Exploring the dark side of the web
Digging in the deep web: Exploring the dark side of the web | Ing Pierluigi Paganini | ISBN: 9781980532545 | Kostenloser Versand für alle Bücher mit Versand und Verkauf duch Amazon.
Countdown to Zero Day
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare-one in which a digital attack can have the same destructive capability as a megaton bomb. In January 20…
Thinking Security
Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You…
Understanding Cryptography
Understanding Cryptography: A Textbook for Students and Practitioners
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even med…
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
The world’s most infamous hacker offers an insider’s view of thelow-tech threats to high-tech securityKevin Mitnick’s exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and documentaries. Since hisrel…
A Bug Hunter’s Diary
A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.A Bug Hunter’s Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world’s most popular softwar…
Cyberwarfare Sourcebook
CYBERWARFARE SOURCEBOOK
Concerning application layer DDoS attacks, Bureau 121, camfecting, cyber attack threat trends, ECHELON, Fifth Dimension Operations, Intervasion of the UK, Military-digital complex, PLA Unit 61398, Stuxnet, and more
The Antivirus Hacker’s Handbook
The Antivirus Hacker’s Handbook
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker’s Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your net…