Catalog Search Results
Author
Description
As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate number of seniors being coerced, targeted, and robbed through the same internet we all share.
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience. Whether...
Author
Description
���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! ����
Are you ready to master the art of ethical hacking and become a formidable defender of the digital realm? Look no further! Dive into the world of cybersecurity with our comprehensive book bundle, "Cyber Auditing Unleashed." This four-book collection is your ticket to advanced security auditing, providing you...
103) Burp Suite
Author
Description
Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!
Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!
What's Inside:
���� Book 1 - Burp Suite Fundamentals: A Novice's Guide to...
104) Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking w
Author
Description
As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.
Thankfully, there is a solution, and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing...
105) Blue Team Operations
Author
Description
Unlock the Power of Blue Team Defense!
���� Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity Solution
Are you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers...
Author
Description
Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click....
Author
Description
Unlock the Secrets of Malware with "Malware Reverse Engineering: Cracking the Code" - Your Comprehensive Guide to Cybersecurity
Are you ready to embark on a transformative journey into the world of cybersecurity and malware reverse engineering? Look no further than our book bundle, "Malware Reverse Engineering: Cracking the Code." This carefully curated collection spans four volumes, each designed to cater to your expertise level, from beginners...
Author
Description
Small businesses make up over 90% of all businesses, and they account for nearly 50% of the gross domestic product. Yet, other than the bad guys, there isn't a lot of focus on cybersecurity for small businesses. This book aims to help small businesses learn what the bad guys are after, and how they can protect their businesses.
109) Lockdown
Author
Series
Urban Outlaws volume 3
Pub. Date
2016
Physical Desc
262 pages ; 22 cm.
Description
"When an ally betrays the Urban Outlaws and steals a dangerous computer virus, the kids have no choice but to team up with a shadowy figure known as "The Shepherd" to take down their foe, and as they explore the unfamiliar streets and secret passageways of New York City and Los Angeles, they once again risk everything to save themselves. . . and the world"--
Author
Publisher
DC Comics
Pub. Date
[2020]
Physical Desc
1 volume (unpaged) : illustrations (chiefly color) ; 26 cm
Description
Combinando la inteligencia de Bruce Wayne, con la locura de Joker y el malévolo poder del Multiverso Oscuro, esta versión retorcida del Paladín Encapotado ha infectado a seis héroes con su maldad. A menos que los descubran y detengan, transformarán el mundo y lo convertiran en la viva y retorcida imagen de su amo.
Author
Series
Gameknight999. Herobrine reborn volume 3
Publisher
Sky Pony Press
Pub. Date
[2016]
Physical Desc
213 pages : illustration ; 21 cm.
Description
When Herder volunteers to journey into the dangerous world of the Nether to destroy Herobrine's poisonous XP and is accidentally infected, Gameknight and his friends are forced to make a terrible choice.
Author
Description
Throughout this series, I discussed definitive insights and themes in The Psychology of Insider Threat Prevention Cyber Security that can prepare the ITP CS Specialist to become more aware and cautious about the genius of the ordinary malicious insider. Malicious insiders are not often stupid. They are most often very smart people who do stupid things. The dangerous challenge occurs when brilliant people launch malicious insider attacks brilliantly....
Author
Description
Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks
Key Features
Adopt a methodological approach to binary ELF analysis on Linux
Learn how to disassemble binaries and understand disassembled code
Discover how and when to patch a malicious binary during analysis
Book Description
Binary analysis is the process of examining a binary program...
Author
Description
A practical book that will help you defend against malicious activities
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on...
Author
Description
This book shows unequivocally that cyber weapons create deep psychological harm to society. So long lasting and intense can these effects be that they can create paranoia and cognitive confusion. Cyber weapons include simple ransomware to sophisticated bots, which can be used to bring down a nation's infrastructure, power lines, banking, and even nuclear facilities. The use of cyber weapons to sow seeds of discord in society, change human behavior,...
Author
Description
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book Description An understanding of how digital forensics integrates with the...
118) Cyber Curiosity: A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World
Author
Description
Every year, thousands of people fall victim to phone scams, phishing attacks, and identity theft. But the consequences of these attacks are completely preventable if you practice cybersecurity awareness.
Many associate cybersecurity with large corporations, so why is it important for you? Cyber Curiosity: A Beginner's Guide to Cybersecurity-How to Protect Yourself in the Modern World answers this through the stories of individuals and corporations...
Author
Description
This book is written to make all young kids the best cook they might wanna be. Are you willing to make mommy rest instead of stressing her in the kitchen after a long day at work? The key is to become the best cook ever. This book contains 50 keto friendly recipes that are healthy, delicious and you can prepare them easily.
120) Virus
Author
Publisher
Princeton University Press
Pub. Date
2016.
Physical Desc
256 pages : illustrations (chiefly color) ; 25 cm
Description
"Featuring hundreds of breathtaking color images throughout, this guide begins with a lively and informative introduction to virology. Here readers can learn about the history of this unique science, how viruses are named, how their genes work, how they copy and package themselves, how they interact with their hosts, how immune systems counteract viruses, and how viruses travel from host to host. The concise entries that follow highlight important...
Didn't find it?
Can't find what you are looking for? Let us know! Suggest a Title