Free Delivery Over $100
785 books were found.
Read More >>
This training course is a Linux ARM64 (A64) version of the previous Practical Foundations of Linux Debugging, Disassembly,... Read More >>
This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software... Read More >>
This book is a revised edition of the original Accelerated Windows Software Trace Analysis training course. General... Read More >>
Presents an actionable blueprint for organizations seeking a robust defense against one of the most destructive... Read More >>
Comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning and... Read More >>
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag.... Read More >>
Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and... Read More >>
The EU Data Protection Code of Conduct for Cloud Service Providers provides guidance on how to implement the EU... Read More >>
Nothing is more important than preserving security on websites. Internet security is a constantly evolving arena,... Read More >>
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful,... Read More >>
The Ransomware Handbook is an essential read for anyone wishing to learn about ransomware attacks. Mike thoroughly... Read More >>
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social... Read More >>
This book pinpoints current and impending threats to the healthcare industry's data security. Read More >>
This book examines in depth the major recent cyber attacks that have taken place in the United States and around... Read More >>
Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps... Read More >>
In this biography, we will separate fact from fiction to discover who the real John McAfee really was while telling... Read More >>