(Išleidimo metai: 17-Apr-2025, Paperback / softback, Leidėjas: John Wiley & Sons Inc, ISBN-13: 9781394349586)
A transformative new approach to Internet security from an experienced industry expert Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet secu...Daugiau...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of kn...Daugiau...
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unp...Daugiau...
This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centred around the semantic annotation of domain-specific source documentat...Daugiau...
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta...Daugiau...
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber securi...Daugiau...
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.Dive into the fascinating and terrifying world of evasive malwarema...Daugiau...
This book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel concepts suc...Daugiau...
(Išleidimo metai: 04-Jul-2024, Paperback / softback, Leidėjas: John Wiley & Sons Inc, ISBN-13: 9781394262410)
A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and...Daugiau...
Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution. ...Daugiau...
Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution. Ransomware is a threat...Daugiau...
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time. Original. Index. The story of a band of volunteer cybersecurity experts who use their computer skills to crack rans...Daugiau...
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta...Daugiau...
Focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Topics covered include intrusion detection systems, low-...Daugiau...
Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in...Daugiau...
Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recen...Daugiau...
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it t...Daugiau...