ePrivacy and GPDR Cookie Consent by Cookie Consent
Info You can find and rate any book here

Explore all books in Computers / Security / Viruses & Malware category

CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition

Matt Walker

Computers / Security / Viruses & Malware

🥺 Not rated yet

How To Protect Yourself From Adware And Spyware

Bill Medina

Computers / Security / Viruses & Malware

🥺 Not rated yet

Dark Territory

The Secret History of Cyber War

Fred M. Kaplan

Computers / Security / Viruses & Malware

🥺 Not rated yet

Ransomware

Defending Against Digital Extortion

Allan Liska , Timothy Gallo

Computers / Security / Viruses & Malware

🥺 Not rated yet

This Is How They Tell Me the World Ends

The Cyberweapons Arms Race

Nicole Perlroth

Computers / Security / Viruses & Malware

🥺 Not rated yet

Real-World Bug Hunting

A Field Guide to Web Hacking

Peter Yaworski

Computers / Security / Viruses & Malware

🥺 Not rated yet

Malware Forensics Field Guide for Windows Systems

Digital Forensics Field Guides

Cameron H. Malin , Eoghan Casey , James M. Aquilina

Computers / Security / Viruses & Malware

🥺 Not rated yet

Practical Malware Analysis

The Hands-On Guide to Dissecting Malicious Software

Andrew Honig , Michael Sikorski

Computers / Security / Viruses & Malware

🥺 Not rated yet

Understanding Security Issues

Chris Williams , Scott Donaldson , Stanley Siegel

Computers / Security / Viruses & Malware

🥺 Not rated yet

Practical Binary Analysis

Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

Dennis Andriesse

Computers / Security / Viruses & Malware

🥺 Not rated yet

Botnets

Architectures, Countermeasures, and Challenges

Georgios Kambourakis , Marios Anagnostopoulos , Peng Zhou , Weizhi Meng

Computers / Security / Viruses & Malware

🥺 Not rated yet

Ransomware

Defending Against Digital Extortion

Allan Liska , Timothy Gallo

Computers / Security / Viruses & Malware

🥺 Not rated yet

The Art of Mac Malware

The Guide to Analyzing Malicious Software

Patrick Wardle

Computers / Security / Viruses & Malware

🥺 Not rated yet

Malware Data Science

Attack Detection and Attribution

Hillary Sanders , Joshua Saxe

Computers / Security / Viruses & Malware

🥺 Not rated yet

Zero Days, Thousands of Nights

The Life and Times of Zero-Day Vulnerabilities and Their Exploits

Andy Bogart , Lillian Ablon

Computers / Security / Viruses & Malware

🥺 Not rated yet