CRC Press, 2025. — 200 p. — ISBN-13: 978-1-003-60467-9. This book helps to reduce the risk of data loss by monitoring and controlling the flow of sensitive data via network, email, or web. Guardians of Data also shows guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory...
Apress Media LLC, 2025. — 224 p. — ISBN-13: 979-8-8688-1303-0. Remote development has drastically changed the way teams build software. The freedom to work from wherever and possibly whenever has increased flexibility, but these benefits have not come without growing pains. The people managing this new type of team have worked tirelessly to adapt existing practices to this new,...
Independently published, 2025. — 196 p. — ISBN 978-1230008883872. EPUB (true) 18+ Exploring the Dark Web: An Ex-Hacker’s True Horror Stories & Cyber Secrets. Unmask the Hidden Internet – A Real-World Deep Dive into the Dark Web. Have you ever been curious about the Dark Web, Deep Web, and Hidden Internet? Forget the myths—this firsthand account from an ex-hacker reveals the...
John Wiley & Sons, Inc., 2024. — 368 р. — ISBN-13: 978-1394253135. Discover the power of open source observability for your enterprise environment In Mastering Observability and OpenTelemetry: Enhancing Application and Infrastructure Performance and Avoiding Outages, accomplished engineering leader and open source contributor Steve Flanders unlocks the secrets of enterprise...
Wiley, 2025. — 821 p. — ISBN-13 978-1394201600. A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment. In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and...
Springer, 2024. — 126 p. — ISBN 978-3-031-65437-4. Digital Shakedown: полное руководство по пониманию программ-вымогателей и борьбе с ними This book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel...
Springer, 2024. — 197 p. — ISBN 978-981-97-1458-2. The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in...
O’Reilly Media, Inc., 2024. — 402 p. — ISBN 978-1-098-16947-3. By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of...
Independently published, 2019. — 408 p. Do you feel that informatics is indispensable in today’s increasingly digital world? Do you want to introduce yourself to the world of programming or cyber security but don’t know where to get started? If the answer to these questions is yes, then keep reading… Computer Programming And Cyber Security for Beginners. This Book Includes:...
Springer, 2024. — 385 p. — ISBN 978-3-031-37989-5. This book demonstrates the breadth and depth of IP protection through logic locking, considering both attacker/adversary and defender/designer perspectives. The authors draw a semi-chronological picture of the evolution of logic locking during the last decade, gathering and describing all the DO’s and DON’Ts in this approach....
BPB Publications, 2023. — 285 р. — ISBN 978-93-5551-362-5. Crack a ransomware by identifying and exploiting weaknesses in its design. Key Features: - Get an overview of the current security mechanisms available to prevent ransomware digital extortion. - Explore different techniques to analyze a ransomware attack. - Understand how cryptographic libraries are misused by malware...
CRC Press, 2023. — 191 p. — (Security, Privacy, and Trust in Mobile Communications). The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will...
Jones & Bartlett Learning, 2023. — 658 р. — ISBN 978-1284261158. Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on...
Leanpub, 2020-05-13. — 65 р. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware. Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2...
5th Edition. — Apress Media, LLC., 2023. — 620 p. — ISBN-13: 978-1-4842-9036-1. Пошаговое руководство по компьютерной безопасности и конфиденциальности для неспециалистов Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers...
Mercury Learning and Information, 2022. — 350 p. — ISBN-13: 978-1683926634. Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases . Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm...
No Starch Press, 2022. — 512 p. — ISBN 978-3-030-74651-3. The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones,...
Wiley-IEEE Press, 2022. — 371 p. — ISBN 9781119771531. Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in...
No Starch Press, 2022. — 332 p. — ISBN 978-17185-0192-8. Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the...
Wiley, 2022. — 323 p. — ISBN 978-1-119-84912-4. Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger...
Springer, 2021. — 210 p. — ISBN 978-3-030-74449-6. This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book...
Springer, 2021. — 163 p. — ISBN 978-3-030-77221-5. It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted...
Packt Publishing, 2021. — 242 p. — ISBN 978-1-80107-974-7. Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key Features Gain a clear understanding of the security landscape and research approaches to bypass antivirus software Become well-versed with practical techniques to bypass antivirus solutions Discover best practices to...
Walter de Gruyter GmbH, 2021. — 234 p. — ISBN 978-3-11-061675-0. Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation....
Springer, 2021. — 212 p. — ISBN 978-3-030-74663-6. The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and...
Independently published, 2021. — 171 p. — ISBN B097Z5VFG6. The world’s most used penetration testing framework As metasploit.com says: Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness;...
Packt Publishing, 2021. — 282 p. — ISBN 978-1-83921-227-7. Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware Key Features Investigate, detect, and respond to various types of malware threat Understand how to use what you've learned as an analyst to produce actionable IOCs and...
Packt Publishing, 2021. — 236 p. — ISBN 978-1-80056-798-6. Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key Features Get up to speed with Zscaler without the need for expensive training Implement Zscaler Internet Access (ZIA) and...
Springer, 2021. — 211 p. — ISBN 978-3-030-73444-2. Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits. Split manufacturing refers to the process of splitting an IC design into multiple parts and...
Packt Publishing, 2021. — 272 p. — ISBN 978-1800566354. Advance your career as an information security professional by turning theory into robust solutions to secure your organization Key Features Convert the theory of your security certifications into actionable changes to secure your organization Discover how to structure policies and procedures in order to operationalize...
2nd Edition. — Academic Press, 2020. — 763 p. — ISBN: 978-0-12-818427-1. Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all...
Springer, 2021. — 614 p. — ISBN 978-3-030-64447-5. This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware...
O’Reilly Media, Inc., 2021. — 387 p. — ISBN 978-1492094050. Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including...
Springer, 2021. — 219 p. — (Services and Business Process Reengineering). — ISBN 978-981-16-1006-6. This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for...
2nd edition. — Auerbach Publications, 2021. — 423 p. — ISBN 9780367474102. The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and...
Independently published, 2021. — 377 p. — ISBN B08TMTT677. All the Basic Knowledge a newcomer Must Have It is not easy in the ocean of information to find a guide that explains the basics of programming well, avoiding you to jump from one language to another without understanding what you are doing taking the first steps by following the right manual, will facilitate the...
John Wiley & Sons, Inc., 2020. — 464 p. — ISBN: 978-1-119-56026-5. Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing...
Apress, 2020. — 161 p. — ISBN13: 978-1-4842-6401-0. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an...
Apress Media LLC., 2020. — 960 p. — ISBN13: (electronic): 978-1-4842-6106-4. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it...
Syngress, 2016. — 678 p. — ISBN: 0128023244. Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and...
Amazon.com Services LLC, 2020. — 193 p. — ISBN: 979-8614981143. This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or...
Packt Publishing Ltd., July 2020. — 572 p. — ISBN: 978-1-83921-641-1. Enhance Windows security and protect your systems and servers from various cyber attacks Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide to help you gain expertise when implementing...
Packt Publishing, 2020. — 532 p. — ISBN: 978-1-78995-352-7. Identify, exploit, and test web application security with ease Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you’ll explore another aspect of the framework – web...
John Wiley & Sons, Inc., 2015. — 309 p. — ISBN: 978-1-118-89667-9 (ebk). Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology...
2nd Edition. — Packt Publishing, 2020. — 216 p. — ISBN: 978-1-83898-266-9. A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing....
Packt Publishing, 2018. — 436 p. — ISBN: 178883884X. Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key Features Analyze and improvise software and hardware with real-world examples Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and...
Apress, 2019. - 145p. - ISBN: 1484242696 Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between...
O’Reilly Media, 2018. — 371 p. — ISBN: 1491979909. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you'll explore ways to apply machine learning to...
Packt Publishing, 2018. — 426 p. — ISBN: 1788623177. Over 100 recipes for penetration testing using Metasploit and virtual machines Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social...
Packt Publishing, 2018. - 497p. - ISBN: 978-1788997409 Become a master at penetration testing using machine learning with Python Key Features Identify ambiguities and breach intelligent security systems Perform unique cyber attacks to breach robust systems Learn to leverage machine learning algorithms Book Description Cyber security is crucial for both businesses and...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
Packt Publishing, 2017. — 190 p. — ISBN: 978-1788295970. Key Features Carry out penetration testing in highly-secured environments with Metasploit Learn to bypass different defenses to gain access into different systems. A step-by-step guide that will quickly enhance your penetration testing skills. Book Description This book will begin by introducing you to Metasploit and its...
O’Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine...
Packt Publishing, 2012. — 262 p. — ISBN: 978-1-84951-742-3. Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present...
Комментарии