This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and...Loe edasi...
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.This comprehensive guide to Android malware i...Loe edasi...
Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data poin...Loe edasi...
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and d...Loe edasi...
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. Youll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration...Loe edasi...
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acqu...Loe edasi...
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundament...Loe edasi...
Hardening a Linux system can make it much more difficult for an attacker to exploit it. This book will enable system administrators and network engineers to protect their Linux systems, and the sensitive data on those systems....Loe edasi...
Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to anal...Loe edasi...
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop&...Loe edasi...
Leverage the best techniques provided by Apple to build apps with maximum privacy for your users. This book explores not only the how-to steps for implementing privacy in your apps, but also answers workflow questions about what information you actua...Loe edasi...
(Ilmumisaeg: 15-Jul-2019, Other digital carrier, Kirjastus: Sybex Inc.,U.S., ISBN-13: 9781119564362)
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop&...Loe edasi...
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles...Loe edasi...
Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master th...Loe edasi...
Marina L. Gavrilova, C.J. Kenneth Tan, Nabendu Chaki, Khalid Saeed
Sari: Transactions on Computational Science
(Ilmumisaeg: 02-Feb-2018, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662564981)
This, the 31st issue of the Transactions on Computational Science, focusses on signal processing and security in distributed systems. The areas of application include facial recognition, musical analysis, the diagnosis of retinal disorder, quantum...Loe edasi...
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including zero...Loe edasi...
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual build...Loe edasi...
A guide to the Windows Registry cover such topics as Registry structure, live analysis, security, system hive, and tracking user activity. Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Ed...Loe edasi...
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.Users will learn how to conduct successful digital forensic examinations in...Loe edasi...
Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
(Ilmumisaeg: 24-Oct-2014, Hardback, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781482252194)
There has long been a need for a book that covers the tools and tactics for identifying and analyzing Android threats. Ken Dunham, renowned global malware expert, and leading international experts team up to document the best tools and tactics for a...Loe edasi...