Computer viruses, Trojans & worms books

902 books were found.

Lessons from the Frontlines: Insights from a Cybersecurity Career

Lessons from the Frontlines: Insights from a Cybersecurity...

Author: Assaf Keren
ISBN: 9781394395385
Format: Paperback
$57.95

 Read More >>

Zero Trust Security: A Hands-on Guide

Zero Trust Security: A Hands-on Guide

Author: Adam Tilmar Jakobsen (National Cybercrime Centre (NC3), Denmark)
ISBN: 9781394361090
Format: Hardback
$163.95

Principles, applications, and methodologies to help organizations transition from traditional security models to...  Read More >>

The Psychological Frontline: How AI Weaponizes the Human Mind at Scale

The Psychological Frontline: How AI Weaponizes the Human...

Author: William Liu
ISBN: 9798277888070
Format: Paperback
$39.57

You are being attacked right now - and you can't feel it.In The Psychological Frontline, William Liu exposes how...  Read More >>

The API Breach Blueprint: Hacking Strategies and Countermeasures

The API Breach Blueprint: Hacking Strategies and Countermeasures...

Author: Sevrin Kalvos
ISBN: 9798277658451
Format: Paperback
$79.17

APIs are like the secret tunnels of the internet-great for moving information quickly, terrible when the wrong people...  Read More >>

Ethical Web Hacking: Penetration Testing and Security Enhancement

Ethical Web Hacking: Penetration Testing and Security...

Author: Orien Dravell
ISBN: 9798277660874
Format: Paperback
$79.17

So, you want to be a hacker? Relax, I'm not talking about the movie kind where you type three keys and suddenly...  Read More >>

From Byte to Breach: The Network Penetration Testing Blueprint

From Byte to Breach: The Network Penetration Testing...

Author: Kerrian Solvek
ISBN: 9798277693780
Format: Paperback
$79.17

So, you want to hack stuff-legally? Good news: you're in the right place. From Byte to Breach: The Network Penetration...  Read More >>

The Hacker's Handbook: Strategies, Tools, and Incident Response Protocols

The Hacker's Handbook: Strategies, Tools, and Incident...

Author: Drexivar Tholvenis
ISBN: 9798276646251
Format: Paperback
$92.37

So, you want to think like a hacker? Good. That's exactly what this book is about-but don't worry, I'm not handing...  Read More >>

Kali Linux Cookbook: Boost your pentesting career with essential tools such as Nmap, Metasploit, and Wireshark

Kali Linux Cookbook: Boost your pentesting career with...

Author: Corey P. Schultz
ISBN: 9781835889800
Format: Paperback
$118.77

 Read More >>

Practical Digital Forensics: Windows Forensics Deep Dive

Practical Digital Forensics: Windows Forensics Deep...

Author: Rauven Kalderich
ISBN: 9798276545394
Format: Paperback
$92.37

Ever wonder what really happens inside your Windows PC after you hit ""Delete""? Welcome to Practical Digital Forensics:...  Read More >>

The Art of Threat Intelligence: Safeguarding Digital Realms

The Art of Threat Intelligence: Safeguarding Digital...

Author: Orvelkan Tyvranis
ISBN: 9798276267265
Format: Paperback
$92.37

Let's be real-cybersecurity can feel like trying to fight ninjas in the dark while juggling flaming swords. Threats...  Read More >>

Unlocking Software Secrets: The Power of Reverse Engineering

Unlocking Software Secrets: The Power of Reverse Engineering...

Author: Thalyvron Kestharis
ISBN: 9798276248561
Format: Paperback
$79.17

Ever wondered what really happens inside your favorite apps, or why some programs behave like moody teenagers-working...  Read More >>

After the Breach - Post-Exploitation, Persistence, and Cover-Up: Pulling Back the Curtain on the Post Exploitation Phase, Exposing the Strategies, Tools, and Mindset of Those Who Thrive in the Shadows

After the Breach - Post-Exploitation, Persistence, and...

Author: Byte Revenant
ISBN: 9798275513257
Format: Paperback
$47.49

The Book That Goes Where Others Fear to Tread Most cybersecurity texts end at the moment of compromise. They show...  Read More >>

Master Course In Cyber Security & Cyber Security Awareness

Master Course In Cyber Security & Cyber Security Awareness...

Author: Bryson Lee
ISBN: 9798232916404
Format: Paperback
$47.49

Master cybersecurity fundamentals with ""Master Course in Cyber Security & Cyber Security Awareness: Protecting...  Read More >>

Cyber Security Training Course

Cyber Security Training Course

Author: Clio Carson
ISBN: 9798230087793
Format: Paperback
$63.33

Enhance your digital safety with ""Cyber Security Training Course: Maximize Your Device & Browser Security Settings""...  Read More >>

Cyber Threat Intelligence

Cyber Threat Intelligence

Author: Gideon Pace
ISBN: 9798232893446
Format: Paperback
$63.33

Elevate your cybersecurity expertise with ""Cyber Threat Intelligence: Hands-On Mastery to Elevate Your Cybersecurity...  Read More >>

NIS2 Compliance Guide

NIS2 Compliance Guide

Author: J F Hickey
ISBN: 9798232961190
Format: Paperback
$250.80

NIS2 Compliance Guide: A Practical Implementation Framework Navigating the EU Network and Information Security...  Read More >>

Grey Area: Dark Web Data Collection and the Future of OSINT

Grey Area: Dark Web Data Collection and the Future of...

Author: Vinny Troia
ISBN: 9781394357277
Format: Paperback
$82.95

 Read More >>

Scam Ahoy!: A Comprehensive Guide on Safely Navigating the Digital Seas.

Scam Ahoy!: A Comprehensive Guide on Safely Navigating...

Author: Pujan S Mehta ,  Sachin S Kamath
ISBN: 9798270954147
Format: Paperback
$26.37

""Scam Ahoy!"" is an engaging guide to common online scams, blending humor with practical advice to educate readers...  Read More >>

CCISO Explained Like I Am 5

CCISO Explained Like I Am 5

Author: Dorales McLarty
ISBN: 9798232632571
Format: Paperback
$131.97

CCISO Explained Like I Am 5 is an accessible yet comprehensive guide designed to demystify the EC-Council's Certified...  Read More >>

The Billion Dollar Heist: How Hackers Nearly Stole from Bangladesh Bank

The Billion Dollar Heist: How Hackers Nearly Stole from...

Author: David G Stone
ISBN: 9798232950316
Format: Paperback
$76.53

In 2016, hackers nearly pulled off the perfect crime-and a typo saved the global banking system. On a quiet Thursday...  Read More >>

Ultimate Microsoft Security Copilot for Security Operations: Reimagine Your Enterprise Security with Microsoft Security Copilot to Automate Defenses and Outpace Modern Threats

Ultimate Microsoft Security Copilot for Security Operations:...

Author: Raghu Boddu
ISBN: 9789349888111
Format: Undefined
$65.87

Microsoft Security Copilot helps defenders keep up by using Generative AI to detect, investigate, and respond to...  Read More >>

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Building Effective Privacy Programs: Cybersecurity from...

Author: Jason Edwards (Birkbeck, University of London, UK) ,  Griffin Weaver (University of Utah; Brigham Young University)
ISBN: 9781394342631
Format: Hardback
$168.95

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving...  Read More >>

Kali Linux Hacking Ético 2025: Domina Defensa Ofensiva con Herramientas de Alto Rendimiento

Kali Linux Hacking Ético 2025: Domina Defensa Ofensiva...

Author: Studiod21 Rodrigues ,  Diego Rodrigues
ISBN: 9798274002240
Format: Paperback
$42.69

KALI LINUX HACKING ÉTICO 2025 Domina Defensa Ofensiva con Herramientas de Alto Rendimiento Este libro está dirigido...  Read More >>

Year One Cybersecurity

Year One Cybersecurity

Author: Christopher R Franks
ISBN: 9781088295038
Format: Paperback
$51.06

Embark on your cybersecurity career with confidence using Year One Cybersecurity: Foundational Overview. This clearly...  Read More >>

Certified Ethical Hacker (Ceh) Study Guide: In-Depth Guidance and Practice

Certified Ethical Hacker (Ceh) Study Guide: In-Depth...

Author: Matt Walker ,  David Stifel
ISBN: 9798228675193
Format: Audio
$79.17

The CEH exam is not an enjoyable undertaking. But preparing for the exam itself needn't be that way. In this book,...  Read More >>

Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List