Web Hosting Security

Computer Security Handbook, Set

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written …

Learn more

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this …

Learn more

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way.As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark …

Learn more

CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001)

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ examGet complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001 from this comprehensive …

Learn more

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll begin with simple programs for the reverse and Caesar ciphers and …

Learn more

Malware Data Science: Attack Detection and Attribution

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.Security has become a “big data” problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these …

Learn more

Serious Python: Black-Belt Advice on Deployment, Scalability, Testing, and More

An indispensable collection of practical tips and real-world advice for tackling common Python problems and taking your code to the next level. Features interviews with high-profile Python developers who share their tips, tricks, best practices, and real-world advice gleaned from years of experience.Sharpen your Python skills as you dive deep into the Python programming language with Serious Python. …

Learn more

CompTIA Security+ Guide to Network Security Fundamentals, Loose-Leaf Version

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification — and career success. The text fully maps to the new CompTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of …

Learn more

Cyberwarfare: Information Operations in a Connected World (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Part of the Jones & Bartlett Learning Information Systems Security & Assurance SeriesCyberwarfare puts students on the real-world battlefield of cyberspace! Students will learn the history of cyberwarfare, techniques used in both offensive and defensive information warfare, and how cyberwarfare is shaping military doctrine. Written by subject matter experts, this book combines accessible explanations with realistic experiences and …

Learn more

Introduction to Healthcare Information Technology

The healthcare industry is growing at a rapid pace and undergoing some of its most significant changes as the use of electronic health records increase. Designed for technologists or medical practitioners seeking to gain entry into the field of healthcare information systems, INTRODUCTION TO HEALHCARE INFORMATION TECHNOLOGY teaches the fundamentals of healthcare IT (HIT) by using the CompTIA …

Learn more

Recommended