Computer viruses, Trojans & worms books

866 books were found.

Aprende Owasp Zap: Domina Pruebas de Seguridad y Escaneo Automático

Aprende Owasp Zap: Domina Pruebas de Seguridad y Escaneo...

Author: Studiod21 Smart Tech Content ,  Diego Rodrigues
ISBN: 9798243167208
Format: Paperback
$42.85

APRENDE OWASP ZAP Domina Pruebas de Seguridad y Escaneo Automático Este libro es ideal para estudiantes y profesionales...  Read More >>

Lessons from the Frontlines: Insights from a Cybersecurity Career

Lessons from the Frontlines: Insights from a Cybersecurity...

Author: Assaf Keren
ISBN: 9781394395385
Format: Paperback
$57.95

Transform your approach to cybersecurity leadership with specific, actionable techniques from a 25+ year veteran...  Read More >>

Cyber Warfare: A Reference Handbook

Cyber Warfare: A Reference Handbook

Author: Paul J. Springer (Air Command and Staff College, USA) ,  Mildred Vasan
ISBN: 9798765121689
Format: Paperback
$44.99

An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples of...  Read More >>

Aprende Burp Suite: De la Interceptación a la Exploración Estratégica

Aprende Burp Suite: De la Interceptación a la Exploración...

Author: Studiod21 Smart Tech Content ,  Diego Rodrigues
ISBN: 9798242478671
Format: Paperback
$43.01

APRENDE BURP SUITE De la Interceptación a la Exploración Estratégica APRENDE Burp Suite es una guía técnica y progresiva...  Read More >>

Mastering Maltego: A Practical Handbook for Cyber Threat Hunters

Mastering Maltego: A Practical Handbook for Cyber Threat...

Author: Xandrikor Valthrosen
ISBN: 9798242434455
Format: Paperback
$118.77

Ever wish you could see the invisible threads connecting the internet's shadiest corners? I'm talking about the...  Read More >>

Smart Parent's Guide to Cybersecurity

Smart Parent's Guide to Cybersecurity

Author: Anand Shinde ,  Jessen Kurien
ISBN: 9781916865259
Format: Paperback
$30.36

Parenting doesn't come with a manual-especially in the digital age. Today's children grow up surrounded by screens,...  Read More >>

Hacked and Hunted: A Smart Girl's Guide to Online Safety

Hacked and Hunted: A Smart Girl's Guide to Online Safety...

Author: Anand Shinde ,  Vandana Keswani
ISBN: 9781916865273
Format: Paperback
$26.37

In the digital world, one click can change everything. Social media promises fame, friendship, and freedom-but...  Read More >>

The Black Hat Rust Offensive Engineering Black Book: ADVANCED MALWARE AND RED TEAM DEVELOPMENT BUILD STEALTH IMPLANTS, EDR EVASION MODELS, CROSS-PLATFORM EXECUTIONs AND AUTOMATED ATTACK TOOLING

The Black Hat Rust Offensive Engineering Black Book:...

Author: Ouyang Zhentian
ISBN: 9798261914938
Format: Paperback
$89.73

 Read More >>

From Byte to Breach: The Network Penetration Testing Blueprint

From Byte to Breach: The Network Penetration Testing...

Author: Kerrian Solvek
ISBN: 9798277693780
Format: Paperback
$79.17

So, you want to hack stuff-legally? Good news: you're in the right place. From Byte to Breach: The Network Penetration...  Read More >>

Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy

Chasing Shadows: Cyber Espionage, Subversion, and the...

Author: Ronald J Deibert
ISBN: 9781668014059
Format: Paperback
$42.24

Instant Bestseller Like a John Le Carré novel updated for the digital age, Chasing Shadows provides a gripping...  Read More >>

Zero Trust Security: A Hands-on Guide

Zero Trust Security: A Hands-on Guide

Author: Adam Tilmar Jakobsen (National Cybercrime Centre (NC3), Denmark)
ISBN: 9781394361090
Format: Hardback
$163.95

Principles, applications, and methodologies to help organizations transition from traditional security models to...  Read More >>

Kali Linux Cookbook: Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark

Kali Linux Cookbook: Boost your pentesting career with...

Author: Corey P. Schultz
ISBN: 9781835889800
Format: Paperback
$118.77

 Read More >>

Practical Digital Forensics: Windows Forensics Deep Dive

Practical Digital Forensics: Windows Forensics Deep...

Author: Rauven Kalderich
ISBN: 9798276545394
Format: Paperback
$92.37

Ever wonder what really happens inside your Windows PC after you hit ""Delete""? Welcome to Practical Digital Forensics:...  Read More >>

After the Breach - Post-Exploitation, Persistence, and Cover-Up: Pulling Back the Curtain on the Post Exploitation Phase, Exposing the Strategies, Tools, and Mindset of Those Who Thrive in the Shadows

After the Breach - Post-Exploitation, Persistence, and...

Author: Byte Revenant
ISBN: 9798275513257
Format: Paperback
$47.49

The Book That Goes Where Others Fear to Tread Most cybersecurity texts end at the moment of compromise. They show...  Read More >>

Master Course In Cyber Security & Cyber Security Awareness

Master Course In Cyber Security & Cyber Security Awareness...

Author: Bryson Lee
ISBN: 9798232916404
Format: Paperback
$47.49

Master cybersecurity fundamentals with ""Master Course in Cyber Security & Cyber Security Awareness: Protecting...  Read More >>

Cyber Security Training Course

Cyber Security Training Course

Author: Clio Carson
ISBN: 9798230087793
Format: Paperback
$63.33

Enhance your digital safety with ""Cyber Security Training Course: Maximize Your Device & Browser Security Settings""...  Read More >>

Cyber Threat Intelligence

Cyber Threat Intelligence

Author: Gideon Pace
ISBN: 9798232893446
Format: Paperback
$63.33

Elevate your cybersecurity expertise with ""Cyber Threat Intelligence: Hands-On Mastery to Elevate Your Cybersecurity...  Read More >>

NIS2 Compliance Guide

NIS2 Compliance Guide

Author: J F Hickey
ISBN: 9798232961190
Format: Paperback
$250.80

NIS2 Compliance Guide: A Practical Implementation Framework Navigating the EU Network and Information Security...  Read More >>

Grey Area: Dark Web Data Collection and the Future of OSINT

Grey Area: Dark Web Data Collection and the Future of...

Author: Vinny Troia
ISBN: 9781394357277
Format: Paperback
$82.95

 Read More >>

Scam Ahoy!: A Comprehensive Guide on Safely Navigating the Digital Seas.

Scam Ahoy!: A Comprehensive Guide on Safely Navigating...

Author: Pujan S Mehta ,  Sachin S Kamath
ISBN: 9798270954147
Format: Paperback
$26.37

""Scam Ahoy!"" is an engaging guide to common online scams, blending humor with practical advice to educate readers...  Read More >>

CCISO Explained Like I Am 5

CCISO Explained Like I Am 5

Author: Dorales McLarty
ISBN: 9798232632571
Format: Paperback
$131.97

CCISO Explained Like I Am 5 is an accessible yet comprehensive guide designed to demystify the EC-Council's Certified...  Read More >>

The Billion Dollar Heist: How Hackers Nearly Stole from Bangladesh Bank

The Billion Dollar Heist: How Hackers Nearly Stole from...

Author: David G Stone
ISBN: 9798232950316
Format: Paperback
$76.53

In 2016, hackers nearly pulled off the perfect crime-and a typo saved the global banking system. On a quiet Thursday...  Read More >>

Ultimate Microsoft Security Copilot for Security Operations: Reimagine Your Enterprise Security with Microsoft Security Copilot to Automate Defenses and Outpace Modern Threats

Ultimate Microsoft Security Copilot for Security Operations:...

Author: Raghu Boddu
ISBN: 9789349888111
Format: Undefined
$65.87

Microsoft Security Copilot helps defenders keep up by using Generative AI to detect, investigate, and respond to...  Read More >>

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Building Effective Privacy Programs: Cybersecurity from...

Author: Jason Edwards (Birkbeck, University of London, UK) ,  Griffin Weaver (University of Utah; Brigham Young University)
ISBN: 9781394342631
Format: Hardback
$168.95

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving...  Read More >>

Latest Reading Guide

RGFEB26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List