Filter
Datorvirus, trojaner & maskar
Filter
The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The …
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guide Key Features Gain …
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders …
THE NEW YORK TIMES BESTSELLER * Winner of the Financial Times & McKinsey Business Book of the Year Award * Bronze Medal, Arthur Ross Book Award (Council on Foreign Relations) …
Get to grips with Microsoft’s enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book …
Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print or Kindle book includes a free PDF …
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sources Purchase of the print or Kindle book …
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES ● Extensive hands-on lab instructions in using Kali Linux to crack wireless …
Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization’s network by pentesting AWS, Azure, and GCP effectively Key Features …
Accelerate your journey of securing safety-critical automotive systems through practical and standard-compliant methods Key Features Explore threat landscape and vulnerabilities …