![]() |
The Art of Cyber Security: A Practical Guide to Winning the War on Cyber Crime
ISBN: 9781787783652 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
200,07 |
![]() |
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
ISBN: 9781399921954 / Angielski / Miękka / 110 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
102,87 |
![]() |
Days of Pandemic
ISBN: 9781783825301 / Angielski / Miękka / 54 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
91,25 |
![]() |
Fixing American Cybersecurity: Creating a Strategic Public-Private Partnership
ISBN: 9781647121495 / Angielski / Twarda / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
142,88 |
![]() |
Data Exfiltration Malware, Detection, and Prevention Technologies
ISBN: 9781119898870 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
520,51 |
![]() |
Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2023
ISBN: 9781628316346 / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1604,64 |
![]() |
Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and WinDbg Practice Exercises, Third Edition
ISBN: 9781912636969 / Angielski / Miękka / 326 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
422,61 |
![]() |
7 Rules To Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals
ISBN: 9780648662389 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
75,99 |
![]() |
Intelligent Mobile Malware Detection
ISBN: 9780367638719 / Angielski / Twarda / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,54 |
![]() |
Botnets: Architectures, Countermeasures, and Challenges
ISBN: 9781032401133 / Angielski / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including bo...
|
cena:
227,80 |
![]() |
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation
ISBN: 9781801074292 / Angielski / Miękka / 450 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the or...
|
cena:
179,25 |
![]() |
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
ISBN: 9781803242996 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. T...
|
cena:
179,25 |
![]() |
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
ISBN: 9781801814683 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You'll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their ca...
|
cena:
200,59 |
![]() |
Cyber Weapons of Mass Psychological Destruction: and the People Who Use Them
ISBN: 9781734818895 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
190,53 |
![]() |
Advance Cyber Security
ISBN: 9781774695333 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
722,33 |
![]() |
Deadly Odds 5.0
ISBN: 9781949267921 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
72,36 |
![]() |
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
ISBN: 9781801810210 / Angielski / Miękka / 322 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book DescriptionAs the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to...
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public...
|
cena:
157,91 |
![]() |
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response
ISBN: 9781803238678 / Angielski / Miękka / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key Features Create a solid incident response framework and manage cyber incidents effectively Learn to apply digital forensics tools and techniques to investigate cyber threats Explore the real-world threat of ransomware and apply proper incident response techniques for investigation and recovery Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key...
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-wo...
|
cena:
234,75 |
![]() |
Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes
ISBN: 9781804618851 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be...
Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, pois...
|
cena:
200,59 |
![]() |
Cyber Threat Hunting
ISBN: 9781633439474 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Threat Hunting is a practical guide to the subject giving a reliable and repeatable framework to see and stop attacks. With many key features including ways to design and implement the right framework that will make you see through the eyes of your adversaries, you will learn how to effectively see and stop attacks.
Cyber Threat Hunting is a practical guide to the subject giving a reliable and repeatable framework to see and stop attacks. With many key features in...
|
cena:
256,10 |