![]() |
Mobile Malware Attacks and Defense
ISBN: 9781597492980 / Angielski / Miękka / 409 str. Termin realizacji zamówienia: ok. 22-25 dni roboczych. Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads View attacks as visible to the end user, including notation of variants. * Timeline of Mobile Hoaxes and Threats Understand the... Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This fir...
|
![]() |
cena:
227,91 zł |
![]() |
Cybercrime, Cyberterrorism, and Cyberwarfare
ISBN: 9781441572172 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 22 dni roboczych. |
![]() |
cena:
84,14 zł |
![]() |
Least Privilege Security for Windows 7, Vista and XP
ISBN: 9781849680042 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...
|
![]() |
cena:
339,81 zł |
![]() |
Privacy, Intrusion Detection, and Response : Technologies for Protecting Networks
ISBN: 9781609608361 / Angielski / Twarda / 292 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...
|
![]() |
cena:
772,96 zł |
![]() |
The Death of the Internet
ISBN: 9781118062418 / Angielski / Miękka / 386 str. Termin realizacji zamówienia: ok. 25-30 dni roboczych. Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue,...
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or ...
|
![]() |
cena:
340,34 zł |
![]() |
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)
ISBN: 9780615330150 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 22 dni roboczych. From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...
|
![]() |
cena:
34,09 zł |
![]() |
# PRIVACY Tweet Book01 : Addressing Privacy Concerns in the Day of Social Media
ISBN: 9781607730880 / Angielski / Miękka / 114 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefore no surprise that privacy online is of such great concern in our connected world. Today, when we conduct so much of our life online--bank transactions, credit card payments, transmission of personal messages and images to friends and family--it is completely understandable that we should be concerned about the privacy of our communication and information.
Privacy concerns in the virtual world are often compounded by lack of information and... Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefor...
|
![]() |
cena:
80,02 zł |
![]() |
The CEO's Manual on Cyber Security
ISBN: 9780989253598 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
|
![]() |
cena:
63,19 zł |
![]() |
Victimware: The Missing Part of the Equation
ISBN: 9781908043634 / Angielski / Miękka / 28 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Some software components are innocent victims of other component coding mistakes or deliberate subversion and some start as a part of crimeware and malware but eventually become victims themselves (they crash, hang, spike, leak, are dumped, subverted, etc.) This is a transcript of Software Diagnostics Services Webinar about unified malware and victimware analysis by using behavioural and structural patterns including a live memory dump analysis example.
Some software components are innocent victims of other component coding mistakes or deliberate subversion and some start as a part of crimeware and ma...
|
![]() |
cena:
60,43 zł |
![]() |
Hacking
ISBN: 9781365046612 / Angielski / Twarda / 176 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking... |
![]() |
cena:
168,27 zł |
![]() |
Malware Narratives: An Introduction
ISBN: 9781908043481 / Angielski / Miękka / 56 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especially in the pattern-driven and pattern-based analysis of software logs from complex systems with millions of events, thousands of threads, hundreds of processes and modules. This is a transcript of Software Diagnostics Services Webinar on the new application of software narratology to malware analysis.
Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especi...
|
![]() |
cena:
100,01 zł |
![]() |
Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and Windbg Practice Exercises
ISBN: 9781908043443 / Angielski / Miękka / 234 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn how to navigate process, kernel and physical spaces and diagnose various malware patterns in Windows memory dump files. We use a unique and innovative pattern-driven analysis approach to speed up the learning curve. The training consists of practical step-by-step hands-on exercises using WinDbg, process, kernel and complete memory dumps. Covered more than 20 malware analysis patterns. The main audience are software technical support and escalation engineers who analyze memory dumps from complex software environments and need to check for possible malware presence in cases of abnormal...
Learn how to navigate process, kernel and physical spaces and diagnose various malware patterns in Windows memory dump files. We use a unique and inno...
|
![]() |
cena:
396,90 zł |
![]() |
Android Application Security Essentials
ISBN: 9781849515603 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
![]() |
cena:
256,68 zł |
![]() |
Reverse Deception: Organized Cyber Threat Counter-Exploitation
ISBN: 9780071772495 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and... In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in t... |
![]() |
cena:
167,31 zł |
![]() |
Malware, Rootkits & Botnets A Beginner's Guide
ISBN: 9780071792066 / Angielski / Miękka / 353 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for... Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the m... |
![]() |
cena:
167,31 zł |
![]() |
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
ISBN: 9780071798761 / Angielski / Miękka / 531 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast "The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up... The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th... |
![]() |
cena:
198,98 zł |
![]() |
Anti-Hacker Tool Kit, Fourth Edition
ISBN: 9780071800143 / Angielski / Miękka / 624 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to... Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,... |
![]() |
cena:
198,98 zł |
![]() |
Hacking Exposed Mobile
ISBN: 9780071817011 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior... Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The autho... |
![]() |
cena:
198,98 zł |
![]() |
Computer Viruses For Dummies
ISBN: 9780764574184 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 22-25 dni roboczych. Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.
Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:
Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in comi...
|
![]() |
cena:
49,85 zł |
![]() |
Hacking Made Easy: Hack Your Way Through Life One Step at a Time - Discover the Revolutionary Hacking Secrets of the 21st Century
ISBN: 9781532878763 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
![]() |
cena:
63,36 zł |