The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that …
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of …
VX Underground Black Mass Volume 1
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot …
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book …
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other …
An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentialsprovides a comprehensive introduction to the field, with expert coverage of essential …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many …
Internet publication, version of12.06.2016. — 949 c. — ISBN: N/AThere are several popular meanings of the term “reverse engineering”: 1) …
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is …
Incident response is a multidisciplinary science that resolves computer crime and complex legal issues, chronological methodologies and technical computer techniques. …
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first …
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threatsPurchase of the …
''It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits.'' …