OSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith
ISBN: 9781839386350 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
192,15 zł |
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals
ISBN: 9781800564411 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
216,39 zł |
Advanced OSINT Strategies: Online Investigations And Intelligence Gathering
ISBN: 9781839386473 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
192,15 zł |
Python for Cybersecurity Cookbook: 80+ practical recipes for detecting, defending, and responding to Cyber threats (English Edition)
ISBN: 9789355513809 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
168,11 zł |
Cyber Resilience: Defence-In-Depth Principles
ISBN: 9781787784383 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
173,10 zł |
Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security
ISBN: 9781835086858 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
240,44 zł |
Mastering Network Forensics: A Practical Approach to Investigating and Defending Against Network Attacks
ISBN: 9789355516916 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
192,15 zł |
802.11 Security
ISBN: 9780596002909 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your... Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for go... |
|
cena:
149,89 zł |
Surviving Cyberwar
ISBN: 9781605906881 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
|
|
cena:
379,06 zł |
Security and Privacy Assurance in Advancing Technologies: New Developments
ISBN: 9781609602000 / Angielski / Twarda / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
|
|
cena:
1028,11 zł |
Automatic Malware Analysis: An Emulator Based Approach
ISBN: 9781461455226 / Angielski / Miękka / 73 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for... Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam... |
|
cena:
194,97 zł |
The Healthy Pc: Preventive Care, Home Remedies, and Green Computing, 2nd Edition
ISBN: 9780071752916 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Get your PC running at full speed again--and remove malevolent software
Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing, Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for making your PC start up faster, keeping its hard drive in good shape, and updating Windows with the latest security fixes. This hands-on guide also explains how to protect your PC for free using Microsoft Security Essentials, use the Internet... Get your PC running at full speed again--and remove malevolent software
Save yourself time, money, and frustration by becoming your own computer gu... |
|
cena:
133,13 zł |
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
ISBN: 9781449315078 / Angielski / Miękka / 78 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker s opportunity to compromise your app and steal user data. How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information.... With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge yo... |
|
cena:
77,65 zł |
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
ISBN: 9781118825099 / Angielski / Miękka / 912 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,... Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memo... |
|
cena:
278,46 zł |
Principles of Computer Security Lab Manual, Fourth Edition
ISBN: 9780071836555 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Practice the Computer Security Skills You Need to Succeed
In this Lab Manual, you'll practice
Practice the Computer Security Skills You Need to Succeed
|
|
cena:
391,08 zł |
Testing and Securing Android Studio Applications
ISBN: 9781783988808 / Angielski / Miękka / 162 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
187,54 zł |
Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door
ISBN: 9781492603238 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Now a New York Times bestseller Winner of a 2015 Prose Award There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life. In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies-and... Now a New York Times bestseller Winner of a 2015 Prose Award There is a Threat Lur... |
|
cena:
82,55 zł |
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan
ISBN: 9781491949405 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec... Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demon... |
|
cena:
214,15 zł |
Cybersecurity for Everyone: Securing Your Home or Small Business Network
ISBN: 9781940145365 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business. -Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident. There were eight mega breaches in 2013, compared with only one in 2012. - Viruses and Malware. Some security experts estimate there are more than 250,000 new malware variants...
Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make us...
|
|
cena:
90,42 zł |
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
ISBN: 9780770436193 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then,... Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushe...
|
|
cena:
81,55 zł |