Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Amazon.com: Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware: 9781788392501: A, Monnappa K: Books
Tag: Books
Countdown to Zero Day
Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare-one in which a digital attack can have the same destructive capability as a megaton bomb. In January 20…
Thinking Security
Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You…
Understanding Cryptography
Understanding Cryptography: A Textbook for Students and Practitioners
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even med…
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
The world’s most infamous hacker offers an insider’s view of thelow-tech threats to high-tech securityKevin Mitnick’s exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and documentaries. Since hisrel…
A Bug Hunter’s Diary
A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security [Klein, Tobias] on Amazon.com. *FREE* shipping on qualifying offers. A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security
Cyberwarfare Sourcebook
CYBERWARFARE SOURCEBOOK
Concerning application layer DDoS attacks, Bureau 121, camfecting, cyber attack threat trends, ECHELON, Fifth Dimension Operations, Intervasion of the UK, Military-digital complex, PLA Unit 61398, Stuxnet, and more
The Antivirus Hacker’s Handbook
The Antivirus Hacker’s Handbook
The Antivirus Hacker’s Handbook [Koret, Joxean, Bachaalany, Elias] on Amazon.com. *FREE* shipping on qualifying offers. The Antivirus Hacker’s Handbook