Hacking with Kali Linux. A Guide to Ethical Hacking (Hacking with Kali Linux, #1)
by Grzegorz Nowak
Cybersecurity in Healthcare Applications
The book explores the critical challenge of securing sensitive medical data in the face of rising cyber threats. It examines how artificial intelligence can be leveraged to detect and mitigate cyber threats in healthcare environments. It integrates advanced technologies such as AI security applications, blockchain techniques, cryptanalysis, and 5G security to strengthen the protection of healthcare systems. By offering insights into the latest vulnerability assessment technologies and effective...
This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance...
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in impor...
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a sec...
Malware Analysis and Intrusion Detection in Cyber-Physical Systems
Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dy...
Managing Security with Snort & Ids Tools
by Kerry J Cox and Christopher Gerg
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticate...
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualises them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbucks. As you read each report, you'll gain deeper insight into how the vulnerabilities work and how you might find similar ones.
Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into pra...
CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601)
by Glen E Clarke
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ exam This highly effective test preparation guide covers every objective for the latest version of the CompTIA Security+ exam (exam SY0-601). Written by CompTIA training expert Glen E. Clarke, this new editio...
Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against evolving cyber threats Key Features Optimize configurations for peak security performance by tailoring detection thresholds Leverage real-world insights and case studies to improve threat detection and response strategies Establish a strong ITDR defense with Microsoft Defender for Identity Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionWritten b...
Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and--most importantly--how to effectivelydefend against them. This book offers an encyclopedic treatment of thecomputer virus, including: a history of computer viruses, virus behavior,classification, protection strategies, anti-virus and worm-blocking techniques,and how to conduct an accurate threat analysis. The Art of Computer VirusResearch and Defense entertains readers with its look...
99 Things You Wish You Knew Before Your Mobile Device Was Hacked
by Robert Siciliano
In this book you'll learn everything you wanted to know about computer viruses, ranging from the simplest 44-byte virus right on up to viruses for 32-bit Windows, Unix and the Internet. You'll learn how anti-virus programs stalk viruses and what viruses do to evade these digital policemen, including stealth techniques and poly-morphism. Next, you'll take a fascinating trip to the frontiers of science and learn about genetic viruses. Will such viruses take over the world, or will they become the...