Computer viruses, Trojans and worms
Sorting
Name: A-Z Sorting collapsed
Name: A-Z
Name: Z-A

E-book
Price
0
49.99 £
E-book
0
0
Price
49.99 £
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurityKey FeaturesCovers the latest security threats and defense strategies for 2020Introduces techniques and skillsets required to conduct threat hunting and deal with a system breachProvides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much moreBook DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
Read more
E-book
Price
0
24.50 £
E-book
0
0
Price
24.50 £
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them.
Read more
E-book
Price
0
56.99 £
E-book
0
0
Price
56.99 £
A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisationKey FeaturesProtect your organization from cybersecurity threats with field-tested strategiesDiscover the most common ways enterprises initially get compromisedMeasure the effectiveness of your organization's current cybersecurity program against cyber attacksBook DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.
Read more
E-book
Price
0
28.99 £
E-book
0
0
Price
28.99 £
Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with easeConfidently perform networking and application attacks using task-oriented recipesBook DescriptionMany organizations have been affected by recent cyber events.
Read more
E-book
Price
0
24.99 £
E-book
0
0
Price
24.99 £
In der modernen IT-Landschaft sind Störungen unvermeidlich – doch wie können sie schnell und effizient behoben werden, ohne den Betrieb zu beeinträchtigen?
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers Key FeaturesLearn how to develop and program Windows malware applications using hands-on examplesExplore methods to bypass security mechanisms and make malware undetectable on compromised systemsUnderstand the tactics and tricks of real adversaries and APTs and apply their experience in your operationsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionMalware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
A must-read for software developers lacking command-line skills, focusing on Linux.
Read more
E-book
Price
0
30.99 £
E-book
0
0
Price
30.99 £
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Automate vulnerability scanning, network monitoring, and web application security using Python scripts, while exploring real-world case studies and emerging trends like AI and ML in security automationKey FeaturesGain future-focused insights into using machine learning and AI for automating threat detection and responseGet a thorough understanding of Python essentials, tailored for security professionalsDiscover real-world applications of Python automation for enhanced securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigned to address the most common pain point for security teams-scalability-Security Automation with Python leverages the author's years of experience in vulnerability management to provide you with actionable guidance on automating security workflows to streamline your operations and improve your organization's overall security posture.
Read more

E-book
Price
0
35.99 £
E-book
0
0
Price
35.99 £
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyPerform malware analysis for effective incident responseExplore real-life scenarios that effectively use threat intelligence and modeling techniquesBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks.
Read more
E-book
Price
0
25.99 £
E-book
0
0
Price
25.99 £
Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequencesKey FeaturesDiscover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading expertsBook DescriptionCybercriminals are always in search of new methods to infiltrate systems.
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform them with easeUnderstand real-world challenges faced by a CISO and find out the best way to solve themBook DescriptionThe chief information security officer (CISO) is responsible for an organization's information and data security.
Read more
E-book
Price
0
27.99 £
E-book
0
0
Price
27.99 £
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement network enumeration with Nessus and Network Mapper (Nmap)Book DescriptionDigitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures.
Read more
E-book
Price
0
28.00 £
E-book
0
0
Price
28.00 £
Advocates a cybersecurity social contract between government and business in seven key economic sectorsCybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetration tester, malware analyst, digital forensics analyst, CISO, and more rolesUnderstand different key areas in each role and prepare for themBook DescriptionThis book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas.
Read more
E-book
Price
0
42.99 £
E-book
0
0
Price
42.99 £
IT-Sicherheit in kleinen und mittelständischen Unternehmen voranbringenIT- und Informations-Sicherheit ist ein komplexes Thema und die Umsetzung nimmt oft viel Zeit und viele Ressourcen in Anspruch.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Elevate your organization's cybersecurity posture by implementing proven strategies and best practices to stay ahead of emerging threatsKey FeaturesBenefit from a holistic approach and gain practical guidance to align security strategies with your business goalsDerive actionable insights from real-world scenarios and case studiesDemystify vendor claims and make informed decisions about cybersecurity solutions tailored to your needsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIf you are a cybersecurity professional looking for practical and actionable guidance to strengthen your organization's security, then this is the book for you.
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesUnderstand and analyze various modern cyber threats and attackers' techniquesGain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logsExplore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques.
Read more
E-book
Price
0
37.99 £
E-book
0
0
Price
37.99 £
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Key FeaturesGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tacticsLearn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategiesA practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your systemBook DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations.
Read more
E-book
Price
0
26.99 £
E-book
0
0
Price
26.99 £
Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approachesKey FeaturesUncover the steps involved in cloud forensic investigations for M365 and Google WorkspaceExplore tools and logs available within AWS, Azure, and Google for cloud investigationsLearn how to investigate containerized services such as Kubernetes and DockerPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs organizations embrace cloud-centric environments, it becomes imperative for security professionals to master the skills of effective cloud investigation.
Read more
E-book
Price
0
20.99 £
E-book
0
0
Price
20.99 £
Build a blue team for efficient cyber threat management in your organizationKey FeaturesExplore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook DescriptionWe've reached a point where all organizational data is connected through some network.
Read more

E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
Accelerate security detection development with AI-enabled technical solutions using threat-informed defenseKey FeaturesCreate automated CI/CD pipelines for testing and implementing threat detection use casesApply implementation strategies to optimize the adoption of automated work streamsUse a variety of enterprise-grade tools and APIs to bolster your detection programPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionToday's global enterprise security programs grapple with constantly evolving threats.
Read more
E-book
Price
0
26.99 £
E-book
0
0
Price
26.99 £
Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategiesKey FeaturesIntegrate Microsoft Defender for Office 365 fits into your organization's security strategyImplement, operationalize, and troubleshoot Microsoft Defender for Office 365 to align with your organization's requirementsImplement advanced hunting, automation, and integration for effective security operationsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionNavigate the "e;security Wild West"e; with Microsoft Defender for Office 365, your shield against the complex and rapidly evolving cyber threats.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
A must-read for software developers lacking command-line skills, focusing on Linux.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilient security posture Key FeaturesDevelop a comprehensive understanding of advanced defense strategies to shape robust security programsEvaluate the effectiveness of a security strategy through the lens of Defense in Depth principlesUnderstand the attacker mindset to deploy solutions that protect your organization from emerging threatsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn an era of relentless cyber threats, organizations face daunting challenges in fortifying their defenses against increasingly sophisticated attacks.
Read more
E-book
Price
0
205.00 £

E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey FeaturesGain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AILay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturityEquip yourself with the strategies needed to build and manage an effective cybersecurity programBook DescriptionBuilding a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guideKey FeaturesGain hands-on experience with reputable and reliable tools such as KAPE and FTK ImagerExplore artifacts and techniques for successful cybercrime investigation in Microsoft Teams, email, and memory forensicsUnderstand advanced browser forensics by investigating Chrome, Edge, Firefox, and IE intricaciesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn this digitally driven era, safeguarding against relentless cyber threats is non-negotiable.
Read more
E-book
Price
0
30.32 £
E-book
0
0
Price
30.32 £
A guidebook to walking the Alta Via 2 (AV2) between Bressanone and Feltre.
Read more
E-book
Price
0
19.99 £
E-book
0
0
Price
19.99 £
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.
Read more
E-book
Price
0
57.60 £
E-book
0
0
Price
57.60 £
Practice the Computer Security Skills You Need to Succeed!
Read more
E-book
Price
0
22.49 £
E-book
0
0
Price
22.49 £
WINNER: Independent Press Awards 2023 - Category: Computer Cybercrime is a sad, ever-developing reality of our digital lives.
Read more
E-book
Price
28.00 £ * Old Price 45.99 £
E-book
0
0
Price
28.00 £ * Old Price 45.99 £
Advocates a cybersecurity social contract between government and business in seven key economic sectorsCybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy.
Read more
E-book
Price
0
47.50 £
E-book
0
0
Price
47.50 £
A computer forensics "e;how-to"e; for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware.
Read more

E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
"e;The book not only explains how adversarial attacks work but also shows you how to build your own test environment and run attacks to see how they can corrupt ML models.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ebookKey FeaturesHelp in understanding Microsoft 365 Defender and how it is crucial for security operationsImplementation of the proactive security defense capabilities of Microsoft Defender for Endpoint, Identity,Office 365, and Cloud Apps so that attacks can be stopped before they startA guide to hunting and responding to threats using M365D s extended detection and response capabilitiesBook DescriptionThis book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively.
Read more
E-book
Price
0
29.99 £
E-book
0
0
Price
29.99 £
Build a robust cybersecurity program that adapts to the constantly evolving threat landscapeKey FeaturesGain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AILay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturityEquip yourself with the strategies needed to build and manage an effective cybersecurity programBook DescriptionBuilding a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively.
Read more
E-book
Price
0
32.99 £
E-book
0
0
Price
32.99 £
Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers Key FeaturesLearn how to develop and program Windows malware applications using hands-on examplesExplore methods to bypass security mechanisms and make malware undetectable on compromised systemsUnderstand the tactics and tricks of real adversaries and APTs and apply their experience in your operationsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionMalware Development for Ethical Hackers is a comprehensive guide to the dark side of cybersecurity within an ethical context.
Read more
E-book
Price
0
23.99 £
E-book
0
0
Price
23.99 £
Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategyKey FeaturesLearn how to tackle endpoint security problems in your organizationApply practical guidance and real-world examples to harden endpoint securityImplement EDR/XDR tools for optimal protection of digital assetsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn this data-driven age, safeguarding sensitive data and privacy has become paramount, demanding a deep understanding of the intricacies of cyberspace and its associated threats.
Read more
E-book
Price
0
22.99 £
E-book
0
0
Price
22.99 £
Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risksKey FeaturesAdopt a methodological approach to binary ELF analysis on LinuxLearn how to disassemble binaries and understand disassembled codeDiscover how and when to patch a malicious binary during analysisBook DescriptionBinary analysis is the process of examining a binary program to determine information security actions.
Read more
E-book
Price
0
19.99 £
E-book
0
0
Price
19.99 £
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
Read more
E-book
Price
0
24.50 £
E-book
0
0
Price
24.50 £
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them.
Read more
E-book
Price
0
35.99 £
E-book
0
0
Price
35.99 £
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey FeaturesGain a comprehensive understanding of threat validationLeverage open source tools to test security detectionsHarness open source content to supplement detection and testingBook DescriptionThreat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline.
Read more
E-book
Price
0
26.99 £
E-book
0
0
Price
26.99 £
Combine the offensive capabilities of Kali Linux with the defensive strength of a security operations center to enhance cybersecurity for business and training purposesKey FeaturesGain practical experience in defensive security methodsLearn the correct process for acquiring, installing, and configuring a robust SOC from homeCreate training scenarios for junior technicians and analysts using real-world cybersecurity utilitiesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIntroduction to Kali Purple combines red team tools from the Kali Linux OS and blue team tools commonly found within a security operations center (SOC) for an all-in-one approach to cybersecurity.
Read more
E-book
Price
0
56.99 £
E-book
0
0
Price
56.99 £
A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisationKey FeaturesProtect your organization from cybersecurity threats with field-tested strategiesDiscover the most common ways enterprises initially get compromisedMeasure the effectiveness of your organization's current cybersecurity program against cyber attacksBook DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.
Read more
E-book
Price
0
28.99 £
E-book
0
0
Price
28.99 £
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.
Read more