Vi bøger
Levering: 1 - 2 hverdage

Datavirus, trojanske heste og computerorm

Her finder du spændende bøger om Datavirus, trojanske heste og computerorm. Nedenfor er et flot udvalg af over 61 bøger om emnet. Det er også her du finder emner som Malware.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Richie Miller
    207,95 kr.

    If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as Usual (BAU) tasks or deploying new as well as on-going company projects. Most of these jobs requiring you to be on site but since 2020, companies are willing to negotiate with you if you want to work from home (WFH). Yet, to pass the Job interview, you must have experience. Still, if you think about it, all current IT security professionals at some point had no experience whatsoever. The question is; how did they get the job with no experience? Well, the answer is simpler then you think. Well, if you want to become an IT Security professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Passing security exams isn't easy. In fact, due to the raising security beaches around the World, both above mentioned exams are becoming more and more difficult to pass. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:· Data Sources to Support an Incident· How to Assess Organizational Security· File Manipulation & Packet Captures· Forensics & Exploitation Frameworks· Data Sanitization Tools· How to Apply Policies, Processes and Procedures for Incident Response· Detection and Analysis· Test Scenarios & Simulations· Threat Intelligence Lifecycle· Disaster Recovery & Business Continuity· How to Implement Data Sources to Support an Investigation· Retention Auditing, Compliance & Metadata· How to Implement Mitigation Techniques to Secure an Environment· Mobile Device Management· DLP, Content Filters & URL Filters· Key Aspects of Digital Forensics· Chain of Custody & Legal Hold· First Responder Best Practices· Network Traffic and Logs· Screenshots & Witnesses· Preservation of Evidence· Data Integrity· Jurisdictional Issues & Data Breach Notification Laws&

  • af Dmitry Vostokov, Software Diagnostics Institute & Software Diagnostics Services
    357,95 kr.

  • af John Paul Mueller
    542,95 kr.

  • af Manmohan Singh
    2.262,95 kr.

    Now a Days, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks. The nation's critical infrastructure, including the electric power grid, air traffic control system, financial systems, and communication networks, depends extensively on information technology for its operation. National policy makers have become increasingly concerned that adversaries backed by considerable resources will attempt to exploit the cyber vulnerabilities in the critical infrastructure, thereby inflicting substantial harm on the nation. Numerous policy proposals have been advanced, and a number of bills have been introduced in Congress to tackle parts of the cyber security challenge. This book is designed to serve as the textbook for a semester course devoted to cyber security. It is focused on helping students acquired the skills sought in the professional workforce.

  • af Martin Lee
    973,95 kr.

    CYBER THREAT INTELLIGENCE"Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when you know."--Simon Edwards, Security Testing Expert, CEO SE Labs Ltd., Chair AMTSOEffective introduction to cyber threat intelligence, supplemented with detailed case studies and after action reports of intelligence on real attacksCyber Threat Intelligence introduces the history, terminology, and techniques to be applied within cyber security, offering an overview of the current state of cyberattacks and stimulating readers to consider their own issues from a threat intelligence point of view. The author takes a systematic, system-agnostic, and holistic view to generating, collecting, and applying threat intelligence.The text covers the threat environment, malicious attacks, collecting, generating, and applying intelligence and attribution, as well as legal and ethical considerations. It ensures readers know what to look out for when considering a potential cyber attack and imparts how to prevent attacks early on, explaining how threat actors can exploit a system's vulnerabilities. It also includes analysis of large scale attacks such as WannaCry, NotPetya, Solar Winds, VPNFilter, and the Target breach, looking at the real intelligence that was available before and after the attack.Topics covered in Cyber Threat Intelligence include:* The constant change of the threat environment as capabilities, intent, opportunities, and defenses change and evolve* Different business models of threat actors, and how these dictate the choice of victims and the nature of their attacks* Planning and executing a threat intelligence programme to improve an organistation's cyber security posture* Techniques for attributing attacks and holding perpetrators to account for their actionsCyber Threat Intelligence describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, particularly if they wish to develop a career in intelligence, and as a reference for those already working in the area.Reviews:I really enjoyed this engaging book, which beautifully answered one of the first questions I had coming into the profession of cyber security: 'What is Cyber Threat Intelligence?' It progressively walked me through the world of cyber threat intelligence, peppered with rich content collected through years' of experience and knowledge. It is satisfyingly detailed to make it an interesting read for those already in cyber security wanting to learn more, but also caters to those who are just curious about the prevalent cyber threat and where it may be headed. One of the takeaways from this book for me is how finding threats is not the most important thing but how the effective communication of it is equally important so that it triggers appropriate actions at appropriate timing. Moreover, as a penetration tester, we are used to looking at the little details so it was refreshing and eye-opening to learn about the macro view on cyber threat landscape. Ryoko Amano, Penetration TesterCyber threats are a constant danger for companies in the private sector, which makes cyber threat intelligence an increasingly crucial tool for identifying security risks, developing proactive strategies, and responding swiftly to attacks. Martin Lee's new book is a comprehensive guide that takes the mystery out of using threat intelligence to strengthen a company's cyber defence. With a clear and concise explanation of the basics of threat intelligence, Martin provides a full picture of what's available and how to use it. Moreover, his book is packed with useful references and resources that will be invaluable for threat intelligence teams. Whether you're just starting in cybersecurity or a seasoned professional, this book is a must-have reference guide that will enhance your detection and mitigation of cyber threats. Gavin Reid, CISO VP Threat Intelligence at Human SecurityMartin Lee blends cyber threats, intel collection, attribution, and respective case studies in a compelling narrative. Lee does an excellent job of explaining complex concepts in a manner that is accessible to anyone wanting to develop a career in intelligence. What sets this book apart is the author's ability to collect related fundamentals and applications described in a pragmatic manner. Understandably, the book's challenge is non-disclosure of sensitive operational information. This is an excellent reference that I would highly recommend to cyber security professionals and academics wanting to deepen their domain expertise and broaden current knowledge. Threats indeed evolve and we must too. Dr Roland Padilla, FACS CP (Cyber Security), Senior Cyber Security Advisor - Defence Program (CISCO Systems), Army Officer (AUS DoD)An interesting and valuable contribution to the literature supporting the development of cyber security professional practice. This well researched and thoroughly referenced book provides both practitioners and those studying cyber threats with a sound basis for understanding the threat environment and the intelligence cycle required to understand and interpret existing and emerging threats. It is supported by relevant case studies of cyber security incidents enabling readers to contextualise the relationship between threat intelligence and incident response. Hugh Boyes, University of WarwickA valuable resource for anyone within the cyber security industry. It breaks down the concepts behind building an effective cyber threat intelligence practice by not only explaining the practical elements to gathering and sharing intelligence data, but the fundamentals behind why it's important and how to assess the usefulness of it. By also providing a detailed history of intelligence sharing across the ages with a rich set of examples, Martin is able to show the value of developing this side of cyber security that is often neglected. This book is equally accessible to those beginning their careers in cyber security as well as to those who have been in the industry for some time and wish to have a comprehensive reference. Stephan Freeman, Director, Axcelot LtdThis book is a wonderful read; what most impressed me was Martin's ability to provide a succinct history of threat intelligence in a coherent, easy to read manner. Citing numerous examples throughout the book, Martin allows the reader to understand what threat intelligence encompasses and provides guidance on industry best practices and insight into emerging threats which every organisation should be aware of. An incumbent read for any cybersecurity professional! Yusuf Khan, Technical Solutions Specialist - Cybersecurity, Cisco "I really enjoyed this engaging book, which beautifully answered one of the first questions I had coming into the profession of cyber security: 'What is Cyber Threat Intelligence?' It progressively walked me through the world of cyber threat intelligence, peppered with rich content collected through years' of experience and knowledge. It is satisfyingly detailed to make it an interesting read for those already in cyber security wanting to learn more, but also caters to those who are just curious about the prevalent cyber threat and where it may be headed. One of the takeaways from this book for me is how finding threats is not the most important thing but how the effective communication of it is equally important so that it triggers appropriate actions at appropriate timing. Moreover, as a penetration tester, we are used to looking at the little details so it was refreshing and eye-opening to learn about the macro view on cyber threat landscape." --Ryoko Amano, Penetration Tester "Cyber threats are a constant danger for companies in the private sector, which makes cyber threat intelligence an increasingly crucial tool for identifying security risks, developing proactive strategies, and responding swiftly to attacks. Martin Lee's new book is a comprehensive guide that takes the mystery out of using threat intelligence to strengthen a company's cyber defence. With a clear and concise explanation of the basics of threat intelligence, Martin provides a full picture of what's available and how to use it. Moreover, his book is packed with useful references and resources that will be invaluable for threat intelligence teams. Whether you're just starting in cybersecurity or a seasoned professional, this book is a must-have reference guide that will enhance your detection and mitigation of cyber threats." --Gavin Reid, CISO VP Threat Intelligence at Human Security

  • af Virginia Chu & BK Sarthak Das
    443,95 kr.

  • af Ramon Adrian Nastase
    142,95 kr.

  • af Allen Wyler
    227,95 kr.

  • af Dmitry Vostokov & Software Diagnostics Services
    1.192,95 kr.

  • af Glen E. Clarke
    614,95 kr.

    This money-saving collection covers every objective for the CompTIA Security+ exam and contains exclusive bonus contentThis fully updated test preparation bundle covers every topic on the current version of the CompTIA Security+ exam. Designed to be the ultimate self-study resource, this collection includes the current editions of CompTIA Security+ Certification Study Guide and CompTIA Security+ Certification Practice Exams along with exclusive online contentall at a discount of 12% off of the suggested retail price.CompTIA Security+ Certification Bundle, Fourth Edition (Exam SY0-601) provides you with a wide variety of exam-focused preparation resources. Bonus content includes a quick review guide, a security audit checklist, and a URL reference list. Online content from features author-led video training, lab simulations, and a customizable test engine that contains four complete practice exams.Online content includes 500 additional practice questions, 3+ hours of training videos, 50+ lab exercises, and moreContains a bonus quick review guide, security audit checklist, and URL reference listIncludes a 10% off the exam voucher coupon-a $35 value

  • af James Scott
    182,95 kr.

    Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social engineering, keeping your corporation one step ahead of the attackers. It also details how enterprises can implement defenses against social engineering within their security policy. In this book you will learn how to avoid and prevent all of the following and more: - Web Attacks - Social Engineering - Denial of Service caused by botnets - Cloud Hacks - Attacks via the Universal Serial Bus - Clickjacking and cross-site scripting - Phishing attacks from trusted third parties - Data Exfiltration - SSFR Attacks and CRIME (Compression Ratio Info-Leak Made Easy). Don't let your company fall victim to the thousands that will try to compromise its security and take it for all they can. Simply following the steps outlined in this book and being proactive can save you millions.

  • af Noah
    427,95 kr.

    Chinese companies such as Huawei and ZTE are required by Chinese law to serve the interests of the Chinese Communist Party. Backdoors are installed in Chinese made systems to steal other nations' trade secrets. This booklet explains how it was done.

  • af Fernando Uilherme Barbosa de Azevedo
    157,95 kr.

  • af Source: Wikipedia
    176,95 kr.

  • af Todd Wade
    277,95 kr.

  • af Andrew Aldred
    151,95 kr.

    DescriptionThis book covers a variety of topics that are of interest now. It features personal poems from a man who was socially isolated before the corona virus and suffers from chronic health problems and mental illness about himself and his situation. It also covers current politics, global warming, sexuality and sex on television, social issues, personalities in politics and the media, current music and TV and more.

  • af Mark Bowden
    172,95 kr.

    The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. Surprisingly, the U.S. government was only vaguely aware of the threat that Conficker posed, and the task of mounting resistance fell to disparate but gifted group of geeks, Internet entrepreneurs, and computer programmers. They formed what came to be called the Conficker Cabal, and began a tireless fight against the worm. But when Conficker's controllers became aware that their creation was beginning to encounter resistance, they began refining the worm's code to make it more difficult to trace and more powerful testing the Cabal's unity and resolve. Will the Cabal lock down the worm before it is too late? Game on. Worm reports on the fascinating battle between those determined to exploit the internet and those committed to protect it.

  • af Gary Hibberd
    392,95 kr.

    The Art of Cyber Security - A practical guide to winning the war on cyber crimeThis book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry.In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist.Part 2 explores the work of Sun Tzu's The Art of War. The author analyses key sections and reviews them through the lens of cyber security and data protection to derive how his teachings can be used within the cyber security industry. Although Tzu's book on military strategy, tactics and operations was written more than 2,000 years ago, The Art of Cyber Security - A practical guide to winning the war on cyber crime reflects on how relevant Tzu's words are for today's technological era.Receive a different perspective on cyber security, and think differently about the industry and your place within itThis book celebrates the individuals who are striving to protect us in an ever-expanding technological era. Data and technology are so important to our lives, that protecting people who use technology is incredibly important. The professionals working to protect children, adults and corporations have a tough job, and this book celebrates their work while advocating ways for improving cyber security services and fighting cyber crime.This book will challenge your thinking and force you to approach cyber security and data protection from theoretical, philosophical, strategic, tactical and operational perspectives.

  • af Alicia Noors
    227,95 kr.

  • af Craig Mackinder
    177,95 kr.

    There is a threat lurking behind every online interaction that was first recognized nearly three decades ago, but very little has been done to fix it. It's only a matter of time before the unimaginable becomes reality -- life without the Internet. The race is on to get ahead of the danger and protect the Domain Name System (DNS) infrastructure of the Internet before the worst-case scenario ends the Internet as we know it.Based on decades of experience acquired by author Craig MacKinder as an information technology and cybersecurity expert, Cyberdefense: Domain Name Systems as the Next Public Utility is a multi-layered, comprehensive, extensively researched solution to the DNS threat. The way out of this imminent peril begins with securing online data by localizing queries to secure municipal DNS servers nationwide.The DNS is a fundamental and critical part of our global infrastructure, yet most users have no idea what it is, how it works, or how the DNS contributes to the overall stability of the Internet. This book explains the DNS in ways the average reader will easily digest and understand. The menace to Internet security is laid out and then confronted as the pros and cons of the existing partial solutions are explored. Finally, this book delivers an explanation of how local governments will provide universal Internet access to the public as the best mitigation for insecure DNS infrastructure.

  • af Eugene Delgado
    362,95 kr.

    Do you like working using a wireless network since you can carry your computer and work with you everywhere you go?Do you want to keep your precious information and any other critical data on your system safe from a hacker who intends to exploit it maliciously?Do you want to be able to safeguard your system and learn more about the many techniques hackers might use to get access to your computer over your wireless network? Wireless networks have altered how we engage with our systems and technology. We used to rely on a wired service that held us in one spot or moved us from one machine to the next. Today, most electronics, including phones, tablets, and laptops, are mobile and can be used anywhere owing to the ubiquitous wireless network. While this is fantastic news for most people, we must be mindful that there may be certain issues that develop and any weaknesses that a hacker may choose to exploit. This guide will look at some methods we may learn about wireless penetration and how a hacker can get into your system and exploit it frequently without your knowledge. Learning how this kind of intrusion occurs and how we can prevent it as much as possible will simplify us to keep our data secure on our system. Inside this guide, we will cover the following subjects to manage our wireless network and ensure the security of our data: A look at wireless networking and some of the fundamentals to get us started.How to set up our wireless hacking methods and organize all of the gear we'll need.Getting ourselves through all of the many methods of internet encryption.How to make use of a wireless network.What to do in the event of a wireless denial of service attack.Ensure that you have VPNs and firewalls in place to protect your network.A look at some of the fundamentals of cybersecurity and how you may utilize them to keep hackers at bay.How various forms of cyberattacks and malware work.The effects of a cyber-attack and why we must avoid them before they occur.The fundamental actions you must take to scan your network and keep hackers out. And Much More!... While our wireless networks make things simpler and enable us to be more mobile with our own job, they also expose some major weaknesses that hackers love to exploit. When you're ready to learn more about wireless hacking and how to keep your network secure, check out our manual to get started.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.