Datorvirus, trojaner & maskar
Filter
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sources Purchase of the print or Kindle book …
Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malwareKey FeaturesInvestigate, detect, …
Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization’s network by pentesting AWS, Azure, and GCP effectively Key Features …
Accelerate your journey of securing safety-critical automotive systems through practical and standard-compliant methods Key Features Explore threat landscape and vulnerabilities …
Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and managing privacy and risk in the Microsoft 365 environment Key …
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation …
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber …
Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligenceKey FeaturesExplore robust and predictable …
This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform. Implementing AppFog is for developers who want to be able to upload applications …
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book • Set the baseline towards performing malware analysis …