book price comparison granchester win prizes eligible curtis sittenfeld rebus 30th anniversary
Search our site
Blue Light Yokohama by Nicolas Obregon Read the opening extract of the brand new Nicolas Obregon book before its publication on 18/09/2017

Computer viruses, Trojans & worms books

See below for a selection of the latest books from Computer viruses, Trojans & worms category. Presented with a red border are the Computer viruses, Trojans & worms books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer viruses, Trojans & worms books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Metasploit for Beginners by Sagar Rahalkar Metasploit for Beginners

An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics. About This Book * Carry out penetration testing in highly-secured environments with Metasploit...
Format: Paperback - Released: 21/07/2017

Metasploit Bootcamp by Nipun Jaswal Metasploit Bootcamp

Master the art of penetration testing with Metasploit Framework in 7 days About This Book * A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days * Carry out penetration testing in complex and highly-secured...
Format: Paperback - Released: 25/05/2017

Solving Information Assurance Issues Using Defense in Depth Measures and the Analytical Hiearchy Process by Rodney Alexander Solving Information Assurance Issues Using Defense in Depth Measures and the Analytical Hiearchy Process


Format: Paperback - Released: 31/03/2017

Ransomware Defending Against Digital Extortion by Allan Liska, Timothy Gallo Ransomware Defending Against Digital Extortion
,
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your...
Format: Paperback - Released: 02/12/2016

Advanced Persistent Threat Modeling Defending Against APTs by Wil Allsopp Advanced Persistent Threat Modeling Defending Against APTs

Advanced Persistent Threat Modeling is an in-depth guide to targeting and compromising high-security environments. With it, you'll learn how to discover and create attack vectors, move unseen through a target enterprise, establish robust command and control, and exfiltrate data.
Format: Paperback - Released: 30/11/2016

Eccws 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security by Robert (University of Memphis) Koch Eccws 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security


Format: Paperback / softback - Released: 15/06/2016

Detection of Intrusions and Malware, and Vulnerability Assessment Proceedings 13th International Conference, Dimva 2016, San Sebastian, Spain, July 7-8, 2016 by Juan Caballero Detection of Intrusions and Malware, and Vulnerability Assessment Proceedings 13th International Conference, Dimva 2016, San Sebastian, Spain, July 7-8, 2016

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented...
Format: Paperback - Released: 09/06/2016

Combating Security Breaches and Criminal Activity in the Digital Sphere by S. Geetha Combating Security Breaches and Criminal Activity in the Digital Sphere

Provides the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. It features law enforcement perspectives, theoretical foundations, and forensic methods.
Format: Hardback - Released: 22/05/2016

Other books in this genre

Effective Software Risk Analytics From Requirements to Deployment by Mark Wireman Effective Software Risk Analytics From Requirements to Deployment

Author Mark Wireman helps software architects, developers, and security engineers gain an in-depth understanding of how to build security into all aspects of the software development life cycle.
Format: Paperback - Released: 10/05/2016

Iccws 2016 - Proceedings of the 11th International Conference on Cyber Warfare and Security by Tanya Zlateva Iccws 2016 - Proceedings of the 11th International Conference on Cyber Warfare and Security


Format: Paperback / softback - Released: 22/02/2016

Cyber-Risk Management by Atle Refsdal, Bjornar Solhaug, Ketil Stolen Cyber-Risk Management
, ,
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial...
Format: Paperback - Released: 01/10/2015

Leading Issues in Cyber Warfare and Security by Julie Ryan Leading Issues in Cyber Warfare and Security


Format: Paperback / softback - Released: 01/10/2015

Windows Malware Analysis Essentials by Victor Marak Windows Malware Analysis Essentials

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal...
Format: Paperback - Released: 01/09/2015

Information Security & Cybersecurity at the Federal Aviation Administration Challenges & Control Efforts by Victor Morris Information Security & Cybersecurity at the Federal Aviation Administration Challenges & Control Efforts


Format: Hardback - Released: 01/09/2015

Safe Computing Is Like Safe Sex You Have to Practice It to Avoid Infection by Ken Cureton, Steve, PhD Levinson, Richard Jr Lowe Safe Computing Is Like Safe Sex You Have to Practice It to Avoid Infection
, , ,

Format: Paperback / softback - Released: 25/06/2015

Registered users have access to unique site features

Register now