Related Books

Malware Analyst's Cookbook and DVD
Language: en
Pages: 744
Authors: Michael Ligh
Categories: Computers
Type: BOOK - Published: 2010-09-29 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of mal
Violent Python
Language: en
Pages: 289
Authors: TJ O'Connor
Categories: Computers
Type: BOOK - Published: 2012-12-28 - Publisher: Newnes

DOWNLOAD EBOOK

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on anoth
The Art of Memory Forensics
Language: en
Pages: 912
Authors: Michael Hale Ligh
Categories: Computers
Type: BOOK - Published: 2014-07-22 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve di
Attack and Defend Computer Security Set
Language: en
Pages: 1510
Authors: Dafydd Stuttard
Categories: Computers
Type: BOOK - Published: 2014-03-17 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the
The Rootkit Arsenal: Escape and Evasion
Language: en
Pages: 937
Authors: Bill Blunden
Categories: Computers
Type: BOOK - Published: 2009-05-04 - Publisher: Jones & Bartlett Publishers

DOWNLOAD EBOOK

With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach tha