The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that …
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of …
VX Underground Black Mass Volume 1
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot …
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book …
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other …
An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentialsprovides a comprehensive introduction to the field, with expert coverage of essential …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many …
Internet publication, version of12.06.2016. — 949 c. — ISBN: N/AThere are several popular meanings of the term “reverse engineering”: 1) …
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is …
Incident response is a multidisciplinary science that resolves computer crime and complex legal issues, chronological methodologies and technical computer techniques. …
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first …
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threatsPurchase of the …
''It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits.'' …
Issues (Editions)YearIssue2020Volume: 20201234567891011122019Volume: 20191234567891011122018Volume: 20181234567891011122017Volume: 20171234567891011122016Volume: 20161234567891011122015Volume: 20151234567891011122014Volume: 20141234567891011122013Volume: 20131234567891011122012Volume: 20121234567891011122011Volume: 20111234567891011122010Volume: 20101234567891011122009Volume: 20091234567891011122008Volume: 20081234567891011122007Volume: 20071234567891011122006Volume: 20061234567891011122005Volume: 20051234567891011122004Volume: 20041234567891011122003Volume: 20031234567891011122002Volume: …
Issues (Editions)YearIssue2012Volume: 81-2342011Volume: 81-2Volume: 7342010Volume: 7232009Volume: 71Volume: 61234Volume: 512342008Volume: 6123Volume: 5234Volume: 41342007Volume: 41234Volume: 31234Volume: 242006Volume: 31Volume: 21234Volume: 13-42005Volume: 11-2???Volume: ??????
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology …
Sednit also known as APT28, Sofacy, Strontium and Fancy Bear – has been operating since at least 2004, and has …