Datorvirus, trojaner & maskar
Filter
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threatsKey …
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in …
A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solution Key Features Learn how to leverage Microsoft's XDR and SIEM for …
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guide Key Features Gain …
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey FeaturesDevelop and implement a threat intelligence program …
A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary reference Key Features Learn about real-world cryptographic pitfalls and …
Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundationsKey FeaturesDiscover a range of techniques to escalate …
Get to grips with Microsoft’s enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book …
Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print or Kindle book includes a free PDF …
Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced features Key Features Find out how to activate, deploy, and configure Prisma …