![]() |
Plunkett's Cybersecurity, Digital ID & Online Fraud Industry Almanac 2023
ISBN: 9781628316346 / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1621,15 |
![]() |
Accelerated Windows Malware Analysis with Memory Dumps: Training Course Transcript and WinDbg Practice Exercises, Third Edition
ISBN: 9781912636969 / Angielski / Miękka / 326 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
427,28 |
![]() |
7 Rules To Become Exceptional At Cyber Security: A Practical, Real-world Perspective For Cyber Security Leaders and Professionals
ISBN: 9780648662389 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
76,83 |
![]() |
Intelligent Mobile Malware Detection
ISBN: 9780367638719 / Angielski / Twarda / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
386,87 |
![]() |
Botnets: Architectures, Countermeasures, and Challenges
ISBN: 9781032401133 / Angielski / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including bo...
|
cena:
242,26 |
![]() |
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation
ISBN: 9781801074292 / Angielski / Miękka / 450 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the or...
|
cena:
181,23 |
![]() |
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
ISBN: 9781803242996 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. T...
|
cena:
181,23 |
![]() |
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
ISBN: 9781801814683 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You'll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their ca...
|
cena:
202,81 |
![]() |
Cyber Weapons of Mass Psychological Destruction: and the People Who Use Them
ISBN: 9781734818895 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
192,63 |
![]() |
Advance Cyber Security
ISBN: 9781774695333 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
729,76 |
![]() |
Deadly Odds 5.0
ISBN: 9781949267921 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
73,15 |
![]() |
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
ISBN: 9781801810210 / Angielski / Miękka / 322 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book DescriptionAs the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to...
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public...
|
cena:
159,64 |
![]() |
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response
ISBN: 9781803238678 / Angielski / Miękka / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key Features Create a solid incident response framework and manage cyber incidents effectively Learn to apply digital forensics tools and techniques to investigate cyber threats Explore the real-world threat of ransomware and apply proper incident response techniques for investigation and recovery Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key...
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-wo...
|
cena:
237,33 |
![]() |
Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes
ISBN: 9781804618851 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be...
Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, pois...
|
cena:
202,81 |
![]() |
Cyber Threat Hunting
ISBN: 9781633439474 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Threat Hunting is a practical guide to the subject giving a reliable and repeatable framework to see and stop attacks. With many key features including ways to design and implement the right framework that will make you see through the eyes of your adversaries, you will learn how to effectively see and stop attacks.
Cyber Threat Hunting is a practical guide to the subject giving a reliable and repeatable framework to see and stop attacks. With many key features in...
|
cena:
258,91 |
![]() |
Cissp: Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans
ISBN: 9781839381812 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
77,65 |
![]() |
Pattern-Oriented Memory Forensics: A Pattern Language Approach, Revised Edition
ISBN: 9781912636761 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
129,48 |
![]() |
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
ISBN: 9781803246345 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threats Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn to build security monitoring solutions based on Microsoft 365 and Sentinel Understand how Zero-Trust access and SASE services can help in mitigating risks Build a secure foundation for Windows endpoints, email, infrastructure, and cloud services Book DescriptionIf you're looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From...
Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threats Purchase of the print or...
|
cena:
172,59 |
![]() |
The Android Malware Handbook: Using Manual Analysis and ML-Based Detection
ISBN: 9781718503304 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This comprehensive guide to Android malware introduces current threats facing the world's most widely used operating system. After exploring the history of attacks seen in the wild since the time Android first launched, including several malware families previously absent from the literature, you'll practice static and dynamic approaches to analysing real malware specimens. Next, you'll examine the machine-learning techniques used to detect malicious apps, the types of classification models that defenders can use, and the various features of malware specimens that can become input to these...
This comprehensive guide to Android malware introduces current threats facing the world's most widely used operating system. After exploring the histo...
|
cena:
241,50 |
![]() |
Linux Essentials for Hackers & Pentesters: Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Commands
ISBN: 9788196228514 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
231,17 |