Catalog Search Results
Author
Language
English
Description
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes of an incident with the aim of bringing the perpetrators to justice. These two disciplines have a close but complex relationship and require a balancing act to get right, but both are essential...
Author
Series
Language
English
Description
Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members.
Art of exploitation. We start by building a small hardware backdoor that we plant in a retail store owned by our target brand. You get to learn about the Wiegand protocol and how to bypass card readers found in all major shops and companies.
Network security. Using...
Author
Publisher
Random House Worlds
Pub. Date
2022
Language
English
Formats
Description
"A mysterious plague that causes random bouts of violence is sweeping the nation. Now three generations of women must navigate their chilling new reality in this moving exploration of identity, cycles of abuse, and hope. Chelsea Martin appears to be the perfect housewife: married to her high school sweetheart, the mother of two daughters, keeper of an immaculate home. But Chelsea's husband has turned their house into a prison; he has been abusing...
44) Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacki
Author
Language
English
Description
As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.Thankfully, there is a solution and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing...
Author
Language
English
Description
What is a computer virus?
A computer virus is a malicious piece of computer code designed to spread from device to device. A subset of malware, these self-copying threats are usually designed to damage a device or steal data.
Think of a biological virus – the kind that makes you sick. It's persistently nasty, keeps you from functioning normally, and often requires something powerful to get rid of it. A computer virus is very similar. Designed...
Author
Series
Language
Español
Description
"La hacker ecuatoriana y experta en seguridad informática, Karina Astudillo B., ha entrenado a miles de estudiantes universitarios y profesionales de computación desde 1996 y ha ayudado a los entusiastas del hacking al compartir artículos prácticos en su popular blog: Seguridad Informática Fácil."¿Siente curiosidad sobre cómo realizan pruebas de intrusión los hackers? ¿Ha querido tomar cursos presenciales de hacking ético pero no tiene...
Author
Language
English
Description
Best Free AntiVirus Software For Ancient Old Windows Xp Sp3 Operating System Bilingual Version In English & Germany Languange. Since Microsoft Corporation officially retired Windows XP Sp3 on October 10 2006, the OS is still very much in use. Which is not really surprising considering how popular it was. Without any patches being installed, It can be really easy for attackers to hack into your computer system like ransomware and virus malware. And...
Author
Series
Language
English
Description
"The ethical hacker and IT security expert, Karina Astudillo B., has trained thousands of university students and IT professionals since 1996, and has helped hacking enthusiasts worldwide by sharing practical advice in her popular blog: Seguridad Informática Fácil (Easy Information Security)."Are you curious about how hackers perform pentesting? Have you wanted to take instructor-led hacking courses but do not have the time to do it?This book has...
Author
Language
English
Description
A detailed guide to know all about PC security and backup
This guide will help you how to protect your computer from viruses, stay safe online and free internet online security software
Based on easy hacks this book will teach you about:
- Antivirus malware firewall backup
- zero-cost software download
- Microsoft security essentials
- Avast free software protection
- Firewall software
- Spyware and Adware
- How to use pop-up...
Author
Language
English
Description
As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate number of seniors being coerced, targeted, and robbed through the same internet we all share.
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience. Whether...
Author
Language
English
Description
Small businesses make up over 90% of all businesses, and they account for nearly 50% of the gross domestic product. Yet, other than the bad guys, there isn't a lot of focus on cybersecurity for small businesses. This book aims to help small businesses learn what the bad guys are after, and how they can protect their businesses.
Author
Language
English
Description
More practical less theory KEY FEATURES ● In-depth practical demonstration with multiple examples of reverse engineering concepts.● Provides a step-by-step approach to reverse engineering, including assembly instructions.● Helps security researchers to crack application code and logic using reverse engineering open source tools. ● Reverse engineering strategies for simple-to-complex applications like Wannacry ransomware and Windows calculator....
Author
Language
English
Description
This book, the third of a four book series, introduces forty behavioral, psychological, management, and technical strategies that collectively enable organizations to unify Continuous Performance Management and other enterprise models with Insider Threat Prevention Cyber Security interventions. Recognizing the core functions of Cyber Security, including Identify, Protect, Detect, Respond, and Recover, do not adequately secure organizations against...
Author
Language
English
Description
A practical book that will help you defend against malicious activitiesModern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's...
Author
Language
English
Description
Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks
Key Features
Adopt a methodological approach to binary ELF analysis on Linux
Learn how to disassemble binaries and understand disassembled code
Discover how and when to patch a malicious binary during analysis
Book Description
Binary analysis is the process of examining a binary program...
Author
Language
English
Description
Learn how to redesign NLP applications from scratch. Key Features• Get familiar with the basics of any Machine Learning or Deep Learning application.•Understand how does preprocessing work in NLP pipeline.•Use simple PyTorch snippets to create basic building blocks of the network commonly used in NLP.•Get familiar with the advanced embedding technique, Generative network, and Audio signal processing techniques. DescriptionNatural language...
Author
Language
English
Description
This book shows unequivocally that cyber weapons create deep psychological harm to society. So long lasting and intense can these effects be that they can create paranoia and cognitive confusion. Cyber weapons include simple ransomware to sophisticated bots, which can be used to bring down a nation's infrastructure, power lines, banking, and even nuclear facilities. The use of cyber weapons to sow seeds of discord in society, change human behavior,...
Author
Language
English
Description
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book Description An understanding of how digital forensics integrates with the...
59) Cyber Curiosity: A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World
Author
Language
English
Description
Every year, thousands of people fall victim to phone scams, phishing attacks, and identity theft. But the consequences of these attacks are completely preventable if you practice cybersecurity awareness.
Many associate cybersecurity with large corporations, so why is it important for you? Cyber Curiosity: A Beginner's Guide to Cybersecurity-How to Protect Yourself in the Modern World answers this through the stories of individuals and corporations...
Author
Language
English
Description
You don't need to risk your security and privacy on consumer-grade security products any longer. Book DescriptionpfSense® is a powerful, commercial-grade firewall that provides capabilities far beyond what you can get in consumer products. This book will walk you through setting up your pfSense® firewall with many easy to follow recipes to choose from, depending on your needs. What you will learn* Blocking malware, phishing and malicious sites and...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request