This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and...Lasīt vairāk
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.This comprehensive guide to Android malware i...Lasīt vairāk
Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data poin...Lasīt vairāk
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and d...Lasīt vairāk
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. Youll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration...Lasīt vairāk
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acqu...Lasīt vairāk
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundament...Lasīt vairāk
Hardening a Linux system can make it much more difficult for an attacker to exploit it. This book will enable system administrators and network engineers to protect their Linux systems, and the sensitive data on those systems....Lasīt vairāk
Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to anal...Lasīt vairāk
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop&...Lasīt vairāk
Leverage the best techniques provided by Apple to build apps with maximum privacy for your users. This book explores not only the how-to steps for implementing privacy in your apps, but also answers workflow questions about what information you actua...Lasīt vairāk
(Izdošanas datums: 15-Jul-2019, Other digital carrier, Izdevniecība: Sybex Inc.,U.S., ISBN-13: 9781119564362)
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop&...Lasīt vairāk
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles...Lasīt vairāk
Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master th...Lasīt vairāk
Marina L. Gavrilova, C.J. Kenneth Tan, Nabendu Chaki, Khalid Saeed
Sērija : Transactions on Computational Science
(Izdošanas datums: 02-Feb-2018, Paperback / softback, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662564981)
This, the 31st issue of the Transactions on Computational Science, focusses on signal processing and security in distributed systems. The areas of application include facial recognition, musical analysis, the diagnosis of retinal disorder, quantum...Lasīt vairāk
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including zero...Lasīt vairāk
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual build...Lasīt vairāk
A guide to the Windows Registry cover such topics as Registry structure, live analysis, security, system hive, and tracking user activity. Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Ed...Lasīt vairāk
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.Users will learn how to conduct successful digital forensic examinations in...Lasīt vairāk
There has long been a need for a book that covers the tools and tactics for identifying and analyzing Android threats. Ken Dunham, renowned global malware expert, and leading international experts team up to document the best tools and tactics for a...Lasīt vairāk