Related Books

Malware Analyst's Cookbook and DVD
Language: en
Pages: 744
Authors: Michael Ligh
Categories: Computers
Type: BOOK - Published: 2010-09-29 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of mal
Violent Python
Language: en
Pages: 289
Authors: TJ O'Connor
Categories: Computers
Type: BOOK - Published: 2012-12-28 - Publisher: Newnes

DOWNLOAD EBOOK

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on anoth
Attack and Defend Computer Security Set
Language: en
Pages: 1510
Authors: Dafydd Stuttard
Categories: Computers
Type: BOOK - Published: 2014-03-17 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the
The Art of Memory Forensics
Language: en
Pages: 912
Authors: Michael Hale Ligh
Categories: Computers
Type: BOOK - Published: 2014-07-22 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve di
The Rootkit Arsenal: Escape and Evasion
Language: en
Pages: 937
Authors: Bill Blunden
Categories: Computers
Type: BOOK - Published: 2009-05-04 - Publisher: Jones & Bartlett Publishers

DOWNLOAD EBOOK

With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach tha