Catalog Search Results
Author
Language
English
Description
In "Careers in Information Technology: Cybersecurity Analyst," readers are introduced to the vital and ever-changing topic of cybersecurity in a perceptive manner. This thorough guide delves into the fascinating field of cybersecurity, illuminating the many prospects, difficulties, and routes to success in this highly sought-after profession. Because businesses, governments, and individuals rely on the security of their digital assets and data, cybersecurity...
Author
Language
English
Description
Introducing the "Zero Trust Security" Book Bundle: Building Cyber Resilience & Robust Security Postures!
In an age of digital transformation, securing your digital world has never been more crucial. The "Zero Trust Security" book bundle is your comprehensive guide to revolutionize your cybersecurity strategies, from beginners to seasoned experts.
Book 1-Zero Trust Security: A Beginner's Guide to Building Cyber Resilience: Discover the foundational...
Author
Language
English
Description
A detailed guide to know all about PC security and backup
This guide will help you how to protect your computer from viruses, stay safe online and free internet online security software
Based on easy hacks this book will teach you about:
- Antivirus malware firewall backup
- zero-cost software download
- Microsoft security essentials
- Avast free software protection
- Firewall software
- Spyware and Adware
- How to use pop-up...
Author
Language
English
Description
In "Hack the Airwaves," Josh, a seasoned cybersecurity expert, delves deep into the intricate world of Bluetooth Low Energy (BLE) security. As BLE devices become increasingly integrated into our daily lives, the potential for vulnerabilities and threats grows exponentially. This comprehensive guide is designed for hackers, red team operators, pentesters, and other cybersecurity practitioners who seek both a foundational understanding and advanced...
Author
Language
English
Description
Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!
Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your comprehensive guide to mastering the art of cyber defense and infrastructure security.
���� BOOK 1 - CYBERWATCH: A BEGINNER'S GUIDE TO DIGITAL SECURITY: Get started on your cybersecurity journey...
Author
Language
English
Description
As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate number of seniors being coerced, targeted, and robbed through the same internet we all share.
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience. Whether...
67) Burp Suite
Author
Language
English
Description
Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!
Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!
What's Inside:
���� Book 1 - Burp Suite Fundamentals: A Novice's Guide to...
68) Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking w
Author
Language
English
Description
As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.
Thankfully, there is a solution, and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing...
Author
Language
English
Description
Unlock the Power of Blue Team Defense!
���� Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity Solution
Are you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers...
Author
Language
English
Description
Small businesses make up over 90% of all businesses, and they account for nearly 50% of the gross domestic product. Yet, other than the bad guys, there isn't a lot of focus on cybersecurity for small businesses. This book aims to help small businesses learn what the bad guys are after, and how they can protect their businesses.
Author
Language
English
Description
Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click....
Author
Language
English
Description
Unlock the Secrets of Malware with "Malware Reverse Engineering: Cracking the Code" - Your Comprehensive Guide to Cybersecurity
Are you ready to embark on a transformative journey into the world of cybersecurity and malware reverse engineering? Look no further than our book bundle, "Malware Reverse Engineering: Cracking the Code." This carefully curated collection spans four volumes, each designed to cater to your expertise level, from beginners...
Author
Language
English
Description
���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! ����
Are you ready to master the art of ethical hacking and become a formidable defender of the digital realm? Look no further! Dive into the world of cybersecurity with our comprehensive book bundle, "Cyber Auditing Unleashed." This four-book collection is your ticket to advanced security auditing, providing you...
Author
Series
Joe Ledger novels volume 7
Language
English
Formats
Description
"On opening day of the new baseball season, a small model-kit airplane flies down from the stands and buzzes the mound, where a decorated veteran pilot is about to throw out the first ball. The toy plane is an exact replica of the one flown by the war hero. Everyone laughs, thinking it a good prank or a publicity stunt. Until it explodes, killing dozens. Seconds later a swarm of killer drones descend upon the panicked crowd, each one carrying a powerful...
75) Night fall
Author
Series
Quantico files volume 1
Language
English
Description
"When authorities contact the FBI about bodies found on freight trains-all killed the same way-Alex Donavan is forced to confront her troubled past when she recognizes the graffiti messages the killer is leaving behind. In a race against time, Alex must decide how far she will go-and what she is willing to risk-to put a stop to the Train Killer"--
Alexandra "Alex" Donavan overcame her troubled upbringing and is now a member of the FBI's elite Behavioral...
Author
Language
English
Description
Throughout this series, I discussed definitive insights and themes in The Psychology of Insider Threat Prevention Cyber Security that can prepare the ITP CS Specialist to become more aware and cautious about the genius of the ordinary malicious insider. Malicious insiders are not often stupid. They are most often very smart people who do stupid things. The dangerous challenge occurs when brilliant people launch malicious insider attacks brilliantly....
Author
Language
English
Description
Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks
Key Features
Adopt a methodological approach to binary ELF analysis on Linux
Learn how to disassemble binaries and understand disassembled code
Discover how and when to patch a malicious binary during analysis
Book Description
Binary analysis is the process of examining a binary program...
Author
Language
English
Description
A practical book that will help you defend against malicious activities
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on...
Author
Language
English
Description
This book shows unequivocally that cyber weapons create deep psychological harm to society. So long lasting and intense can these effects be that they can create paranoia and cognitive confusion. Cyber weapons include simple ransomware to sophisticated bots, which can be used to bring down a nation's infrastructure, power lines, banking, and even nuclear facilities. The use of cyber weapons to sow seeds of discord in society, change human behavior,...
Publisher
Universal Studios Home Entertainment
Pub. Date
[2014]
Language
English
Description
Texas cowboy Ron Woodroof's free-wheeling life was overturned in 1985 when he was diagnosed as HIV-positive. Shunned and ostracized by many old friends and bereft of government-approved medicines, he decided to take matters in his own hands, tracking down alternative treatments from all over the world by means both legal and illegal. Bypassing the establishment, he joined forces with an unlikely band of renegades and outcasts and established a hugely...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request