Win £500 in book vouchers by helping us with a 7 minute reader survey click here.

join us on facebook rebus 30th anniversary newgen books for YA readers twitter
Search our site
The Woman in the Window by A. J. Finn Read the opening extract of the brand new A. J. Finn book before its publication on 22/01/2018

Computer viruses, Trojans & worms books

See below for a selection of the latest books from Computer viruses, Trojans & worms category. Presented with a red border are the Computer viruses, Trojans & worms books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer viruses, Trojans & worms books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Metasploit for Beginners by Sagar Rahalkar Metasploit for Beginners

Covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics, this book carries out penetration testing in highly-secured environments with Metasploit. It helps you learn to bypass different defenses to gain...
Format: Paperback - Released: 21/07/2017

Metasploit Bootcamp by Nipun Jaswal Metasploit Bootcamp

Master the art of penetration testing with Metasploit Framework in 7 days About This Book * A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days * Carry out penetration testing in complex and highly-secured...
Format: Paperback - Released: 25/05/2017

Solving Information Assurance Issues Using Defense in Depth Measures and the Analytical Hiearchy Process by Rodney Alexander Solving Information Assurance Issues Using Defense in Depth Measures and the Analytical Hiearchy Process


Format: Paperback - Released: 31/03/2017

Ransomware Defending Against Digital Extortion by Allan Liska, Timothy Gallo Ransomware Defending Against Digital Extortion
,
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your...
Format: Paperback - Released: 02/12/2016

Eccws 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security by Robert (University of Memphis) Koch Eccws 2016 - Proceedings of the 15th European Conference on Cyber Warfare and Security


Format: Paperback / softback - Released: 15/06/2016

Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings by Juan Caballero Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.The 19 revised full papers and 2 extended abstracts presented were...
Format: Paperback - Released: 09/06/2016

Combating Security Breaches and Criminal Activity in the Digital Sphere by S. Geetha Combating Security Breaches and Criminal Activity in the Digital Sphere

Provides the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. It features law enforcement perspectives, theoretical foundations, and forensic methods.
Format: Hardback - Released: 22/05/2016

Iccws 2016 - Proceedings of the 11th International Conference on Cyber Warfare and Security by Tanya Zlateva Iccws 2016 - Proceedings of the 11th International Conference on Cyber Warfare and Security


Format: Paperback / softback - Released: 22/02/2016

Other books in this genre

Cyber-Risk Management by Atle Refsdal, Bjornar Solhaug, Ketil Stolen Cyber-Risk Management
, ,
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence.
Format: Paperback - Released: 01/10/2015

Information Security & Cybersecurity at the Federal Aviation Administration Challenges & Control Efforts by Victor Morris Information Security & Cybersecurity at the Federal Aviation Administration Challenges & Control Efforts


Format: Hardback - Released: 01/09/2015

Windows Malware Analysis Essentials by Victor Marak Windows Malware Analysis Essentials

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal...
Format: Paperback - Released: 31/08/2015

Safe Computing Is Like Safe Sex You Have to Practice It to Avoid Infection by Ken Cureton, Steve, PhD Levinson, Richard Jr Lowe Safe Computing Is Like Safe Sex You Have to Practice It to Avoid Infection
, , ,

Format: Paperback / softback - Released: 25/06/2015

Protect, Backup and Clean Your PC for Seniors Stay Safe When Using the Internet and Email and Keep Your PC in Good Condition! by Studio Visual Steps Protect, Backup and Clean Your PC for Seniors Stay Safe When Using the Internet and Email and Keep Your PC in Good Condition!


Format: Paperback - Released: 18/12/2014

Computer Forensics with FTK by Fernando Carbone Computer Forensics with FTK

This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format. This...
Format: Paperback - Released: 17/03/2014

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks by Mohssen Mohammed, Al-Sakib Khan Pathan Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
,
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers,...
Format: Hardback - Released: 01/12/2013

Registered users have access to unique site features

Register now