Computer viruses, Trojans & worms books

785 books were found.

Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker

Human Hacked: My Life and Lessons as the World's First...

Author: Len Noe (CyberArk Software)
ISBN: 9781394269167
Format: Paperback
$57.95

Discover the future of cybersecurity through the eyes of the world's first augmented ethical hacker In Human Hacked:...  Read More >>

Cybersecurity Issues in Emerging Technologies

Cybersecurity Issues in Emerging Technologies

Author: Leandros Maglaras ,  Ioanna Kantzavelou
ISBN: 9781032110363
Format: Paperback
$94.99

This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both...  Read More >>

Evidence-Based Cybersecurity: Foundations, Research, and Practice

Evidence-Based Cybersecurity: Foundations, Research,...

Author: Pierre-Luc Pomerleau ,  David Maimon
ISBN: 9781032062785
Format: Paperback
$94.99

This book seeks to explain the foundation of the evidence-based cybersecurity approach, reviews its relevance in...  Read More >>

AWS Security Cookbook: Practical solutions for securing AWS cloud infrastructure with essential services and best practices

AWS Security Cookbook: Practical solutions for securing...

Author: Heartin Kanikathottu
ISBN: 9781835081891
Format: Paperback
$118.77

This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing...  Read More >>

Shores of Okinawa

Shores of Okinawa

Author: Patrick Greenwood
ISBN: 9798985090598
Format: Paperback
$60.59

""Shores of Okinawa,"" the second in the Jack Kendall series written by Patrick Greenwood, brings to light the real-world...  Read More >>

Shores of Okinawa

Shores of Okinawa

Author: Patrick Greenwood
ISBN: 9798986910208
Format: Hardback
$84.35

""Shores of Okinawa,"" the second in the Jack Kendall series written by Patrick Greenwood, brings to light the real-world...  Read More >>

Resilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world

Resilient Cybersecurity: Reconstruct your defense strategy...

Author: Mark Dunkerley
ISBN: 9781835462515
Format: Paperback
$131.97

This book is a valuable resource and offers practical insights, strategies, knowledge to help organizations build...  Read More >>

Mastering Microsoft Defender for Office 365: Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting

Mastering Microsoft Defender for Office 365: Streamline...

Author: Samuel Soto
ISBN: 9781835468289
Format: Paperback
$118.77

Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced...  Read More >>

Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

Evasive Malware: A Field Guide to Detecting, Analyzing,...

Author: Kyle Cucci
ISBN: 9781718503267
Format: Paperback
$130.00

Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed...  Read More >>

Microsoft 365 Administration Cookbook: Enhance your Microsoft 365 productivity to manage and optimize its apps and services

Microsoft 365 Administration Cookbook: Enhance your...

Author: Nate Chamberlain ,  Karuana Gatimu
ISBN: 9781835888025
Format: Paperback
$118.77

Make the most out of your investment in Microsoft 365 apps and services with this Microsoft 365 cookbook for IT...  Read More >>

Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles

Hack the Cybersecurity Interview: Navigate Cybersecurity...

Author: Christophe Foulon ,  Ken Underhill
ISBN: 9781835461297
Format: Paperback
$118.77

Uncover the secrets to acing interviews, decode the diverse roles in cybersecurity, and soar to new heights with...  Read More >>

Cybersecurity: Ethics, Legal, Risks, and Policies

Cybersecurity: Ethics, Legal, Risks, and Policies

Author: Ishaani Priyadarshini (University of Delaware) ,  Chase Cotton (University of Delaware, USA)
ISBN: 9781774639207
Format: Paperback
$175.00

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace....  Read More >>

The Reign of Botnets Lib/E: Defending Against Abuses, Bots and Fraud on the Internet

The Reign of Botnets Lib/E: Defending Against Abuses,...

Author: David Sen�cal ,  Bob Johnson
ISBN: 9798874870294
Format: Audio
$190.05

In The Reign of Botnets, fraud and bot detection expert David Senecal delivers a timely and incisive presentation...  Read More >>

Cybersecurity in Context: Technology, Policy, and Law

Cybersecurity in Context: Technology, Policy, and Law...

Author: Chris Jay Hoofnagle (UC Berkeley School of Law) ,  Golden G. Richard, III (Louisiana State University)
ISBN: 9781394262441
Format: Hardback
$133.95

“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping...  Read More >>

Safe and Secure: A Senior's Guide to Avoiding Scams

Safe and Secure: A Senior's Guide to Avoiding Scams...

Author: Ricky Roane
ISBN: 9798218467135
Format: Paperback
$52.77

"In today's digital age, scams targeting seniors are becoming increasingly sophisticated. ""Safe and Secure: A Senior's...  Read More >>

Cybersecurity Governance

Cybersecurity Governance

Author: Darryl Carlton
ISBN: 9781634624749
Format: Paperback
$131.87

Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive...  Read More >>

DevSecOps for Azure: End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

DevSecOps for Azure: End-to-end supply chain security...

Author: David Okeyode ,  Joylynn Kirui
ISBN: 9781837631117
Format: Paperback
$118.77

From secure development environments to continuous security and compliance integration, this comprehensive guide...  Read More >>

Snort 3 QuickStart Pro: Detect malicious network activity, scan packets, generate alerts, and debug traffic for active intrusion prevention system (IPS)

Snort 3 QuickStart Pro: Detect malicious network activity,...

Author: Darvin Quolmar
ISBN: 9788197416538
Format: Paperback
$184.77

To help cybersecurity, networking, and information technology professionals learn Snort 3 fast, we've created the...  Read More >>

Cyber Warfare: A Reference Handbook

Cyber Warfare: A Reference Handbook

Author: Paul J. Springer (Air Command and Staff College, USA)
ISBN: 9781440879708
Format: Hardback
$110.00

""An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples...  Read More >>

Simplificando la Ciberseguridad

Simplificando la Ciberseguridad

Author: Tommy Lorenzo
ISBN: 9798218458782
Format: Paperback
$26.37

Simplificando la Ciberseguridad ofrece analogías comprensibles, ejemplos del mundo real y explicaciones sencillas...  Read More >>

Certified Ethical Hacker: Session Hijacking, SQL Injections, Cloud Computing, And Cryptography

Certified Ethical Hacker: Session Hijacking, SQL Injections,...

Author: Rob Botwright
ISBN: 9781839388002
Format: Paperback
$93.40

"���� Dive into the world of cybersecurity with the ultimate ""Certified Ethical Hacker"" book bundle! ���� Master...  Read More >>

Kali Linux: INVASION TECHNIQUES PEN TEST 2024 Edition

Kali Linux: INVASION TECHNIQUES PEN TEST 2024 Edition...

Author: Diego Rodrigues
ISBN: 9798335843928
Format: Paperback
$36.70

 Read More >>

Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings

Detection of Intrusions and Malware, and Vulnerability...

Author: Federico Maggi ,  Manuel Egele
ISBN: 9783031641701
Format: Paperback
$237.57

This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware,...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List