Computer viruses, Trojans & worms books

910 books were found.

Lessons from the Frontlines: Insights from a Cybersecurity Career

Lessons from the Frontlines: Insights from a Cybersecurity...

Author: Assaf Keren
ISBN: 9781394395385
Format: Paperback
$57.95

Transform your approach to cybersecurity leadership with specific, actionable techniques from a 25+ year veteran...  Read More >>

Vulnerability Assessment with OpenVAS: Strengthening Cyber Defenses

Vulnerability Assessment with OpenVAS: Strengthening...

Author: Moryven Threxalis
ISBN: 9798242359321
Format: Paperback
$105.57

Let's be honest-cybersecurity sometimes feels like playing whack-a-mole with invisible moles that can teleport,...  Read More >>

Metasploit Revealed: Insider Insights into Advanced Pen Testing Strategies

Metasploit Revealed: Insider Insights into Advanced...

Author: Zorvathen Krymalis
ISBN: 9798242337282
Format: Paperback
$118.77

Ever wanted to feel like the hero and the villain in the same movie? Welcome to the world of advanced penetration...  Read More >>

Penetration Testing Exposed: Mastering the Red Team Approach

Penetration Testing Exposed: Mastering the Red Team...

Author: Theron Veynar
ISBN: 9798241203342
Format: Paperback
$105.57

Penetration Testing Exposed: Mastering the Red Team Approach isn't your average ""dry, technical manual"" that reads...  Read More >>

OpenVAS Mastery: From Installation to Exploitation Prevention

OpenVAS Mastery: From Installation to Exploitation Prevention...

Author: Torvik Relcor
ISBN: 9798279076345
Format: Paperback
$105.57

So, you've decided to dive into the world of cybersecurity and vulnerability scanning? Good call. Let's be honest-running...  Read More >>

The Black Hat Rust Offensive Engineering Black Book: ADVANCED MALWARE AND RED TEAM DEVELOPMENT BUILD STEALTH IMPLANTS, EDR EVASION MODELS, CROSS-PLATFORM EXECUTIONs AND AUTOMATED ATTACK TOOLING

The Black Hat Rust Offensive Engineering Black Book:...

Author: Ouyang Zhentian
ISBN: 9798261914938
Format: Paperback
$89.73

 Read More >>

Unlocking Network Secrets with Nmap: A Complete Scanning Toolkit

Unlocking Network Secrets with Nmap: A Complete Scanning...

Author: Ravian Kestrel
ISBN: 9798261847168
Format: Paperback
$79.17

Ever wonder what your network is whispering behind your back? Spoiler alert: it's a lot. Servers, switches, firewalls...  Read More >>

Maltego Revealed: Investigating Cyber Threats with Advanced Data Linkage

Maltego Revealed: Investigating Cyber Threats with Advanced...

Author: Lorien Vossaric
ISBN: 9798241273703
Format: Paperback
$105.57

So, you want to catch cybercriminals, unmask digital tricksters, and maybe feel like a hacker-detective without...  Read More >>

Nessus Pro Guide: Enhancing Cybersecurity Posture through Vulnerability Scanning

Nessus Pro Guide: Enhancing Cybersecurity Posture through...

Author: Silven Drosar
ISBN: 9798278860839
Format: Paperback
$79.17

Cybersecurity can feel like playing whack-a-mole-just when you patch one hole, another pops up. Hackers never sleep,...  Read More >>

The Psychological Frontline: How AI Weaponizes the Human Mind at Scale

The Psychological Frontline: How AI Weaponizes the Human...

Author: William Liu
ISBN: 9798277888070
Format: Paperback
$39.57

You are being attacked right now - and you can't feel it.In The Psychological Frontline, William Liu exposes how...  Read More >>

The API Breach Blueprint: Hacking Strategies and Countermeasures

The API Breach Blueprint: Hacking Strategies and Countermeasures...

Author: Sevrin Kalvos
ISBN: 9798277658451
Format: Paperback
$79.17

APIs are like the secret tunnels of the internet-great for moving information quickly, terrible when the wrong people...  Read More >>

Ethical Web Hacking: Penetration Testing and Security Enhancement

Ethical Web Hacking: Penetration Testing and Security...

Author: Orien Dravell
ISBN: 9798277660874
Format: Paperback
$79.17

So, you want to be a hacker? Relax, I'm not talking about the movie kind where you type three keys and suddenly...  Read More >>

From Byte to Breach: The Network Penetration Testing Blueprint

From Byte to Breach: The Network Penetration Testing...

Author: Kerrian Solvek
ISBN: 9798277693780
Format: Paperback
$79.17

So, you want to hack stuff-legally? Good news: you're in the right place. From Byte to Breach: The Network Penetration...  Read More >>

Zero Trust Security: A Hands-on Guide

Zero Trust Security: A Hands-on Guide

Author: Adam Tilmar Jakobsen (National Cybercrime Centre (NC3), Denmark)
ISBN: 9781394361090
Format: Hardback
$163.95

Principles, applications, and methodologies to help organizations transition from traditional security models to...  Read More >>

The Hacker's Handbook: Strategies, Tools, and Incident Response Protocols

The Hacker's Handbook: Strategies, Tools, and Incident...

Author: Drexivar Tholvenis
ISBN: 9798276646251
Format: Paperback
$92.37

So, you want to think like a hacker? Good. That's exactly what this book is about-but don't worry, I'm not handing...  Read More >>

Kali Linux Cookbook: Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark

Kali Linux Cookbook: Boost your pentesting career with...

Author: Corey P. Schultz
ISBN: 9781835889800
Format: Paperback
$118.77

 Read More >>

Practical Digital Forensics: Windows Forensics Deep Dive

Practical Digital Forensics: Windows Forensics Deep...

Author: Rauven Kalderich
ISBN: 9798276545394
Format: Paperback
$92.37

Ever wonder what really happens inside your Windows PC after you hit ""Delete""? Welcome to Practical Digital Forensics:...  Read More >>

The Art of Threat Intelligence: Safeguarding Digital Realms

The Art of Threat Intelligence: Safeguarding Digital...

Author: Orvelkan Tyvranis
ISBN: 9798276267265
Format: Paperback
$92.37

Let's be real-cybersecurity can feel like trying to fight ninjas in the dark while juggling flaming swords. Threats...  Read More >>

Unlocking Software Secrets: The Power of Reverse Engineering

Unlocking Software Secrets: The Power of Reverse Engineering...

Author: Thalyvron Kestharis
ISBN: 9798276248561
Format: Paperback
$79.17

Ever wondered what really happens inside your favorite apps, or why some programs behave like moody teenagers-working...  Read More >>

After the Breach - Post-Exploitation, Persistence, and Cover-Up: Pulling Back the Curtain on the Post Exploitation Phase, Exposing the Strategies, Tools, and Mindset of Those Who Thrive in the Shadows

After the Breach - Post-Exploitation, Persistence, and...

Author: Byte Revenant
ISBN: 9798275513257
Format: Paperback
$47.49

The Book That Goes Where Others Fear to Tread Most cybersecurity texts end at the moment of compromise. They show...  Read More >>

Master Course In Cyber Security & Cyber Security Awareness

Master Course In Cyber Security & Cyber Security Awareness...

Author: Bryson Lee
ISBN: 9798232916404
Format: Paperback
$47.49

Master cybersecurity fundamentals with ""Master Course in Cyber Security & Cyber Security Awareness: Protecting...  Read More >>

Cyber Security Training Course

Cyber Security Training Course

Author: Clio Carson
ISBN: 9798230087793
Format: Paperback
$63.33

Enhance your digital safety with ""Cyber Security Training Course: Maximize Your Device & Browser Security Settings""...  Read More >>

Cyber Threat Intelligence

Cyber Threat Intelligence

Author: Gideon Pace
ISBN: 9798232893446
Format: Paperback
$63.33

Elevate your cybersecurity expertise with ""Cyber Threat Intelligence: Hands-On Mastery to Elevate Your Cybersecurity...  Read More >>

NIS2 Compliance Guide

NIS2 Compliance Guide

Author: J F Hickey
ISBN: 9798232961190
Format: Paperback
$250.80

NIS2 Compliance Guide: A Practical Implementation Framework Navigating the EU Network and Information Security...  Read More >>

Grey Area: Dark Web Data Collection and the Future of OSINT

Grey Area: Dark Web Data Collection and the Future of...

Author: Vinny Troia
ISBN: 9781394357277
Format: Paperback
$82.95

 Read More >>

Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List