Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.
Cyberjutsu pres...
A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.
A crash course in modern hacking techniques, Ethical Ha...
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational...
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Security has become a "big data" problem. The...
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and cri...
Practical Malware Analysis – Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent...
Inside the Dark Webprovides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on...
A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requir...
Enter your address and we will specify the offer for your area.