Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
29,551 result(s) for "COMPUTERS / Security / Viruses."
Sort by:
A Cyberworm that Knows No Boundaries
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Cyber Security
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. • A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession • Offers practical guidance and actionable steps for individuals and businesses to protect themselves • Highly accessible and terminology is clearly explained and supported with current, real-world examples
Breaking Ransomware
Crack a ransomware by identifying and exploiting weaknesses in its design Key Features ? Get an overview of the current security mechanisms available to prevent ransomware digital extortion. ? Explore different techniques to analyze a ransomware attack. ? Understand how cryptographic libraries are misused by malware authors to code ransomwares. Description Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you. This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption. By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware. What you will learn ? Get familiar with the structure of Portable Executable file format. ? Understand the crucial concepts related to Export Directory and Export Address Table. ? Explore different techniques used for ransomware static and dynamic analysis. ? Learn how to investigate a ransomware attack. ? Get expert tips to mitigate ransomware attacks. Who this book is for This book is for cybersecurity professionals and malware analysts who are responsible for mitigating malware and ransomware attacks. This book is also for security professionals who want to learn how to prevent, detect, and respond to ransomware attacks. Basic knowledge of C/C++, x32dbg and Reverse engineering skills is a must. Table of Contents Section I: Ransomware Understanding 1. Warning Signs, Am I Infected? 2. Ransomware Building Blocks 3. Current Defense in Place 4. Ransomware Abuses Cryptography 5. Ransomware Key Management Section II: Ransomware Internals 6. Internal Secrets of Ransomware 7. Portable Executable Insides 8. Portable Executable Sections Section III: Ransomware Assessment 9. Performing Static Analysis 10. Perform Dynamic Analysis Section IV: Ransomware Forensics 11. What's in the Memory 12. LockCrypt 2.0 Ransomware Analysis 13. Jigsaw Ransomware Analysis Section V: Ransomware Rescue 14. Experts Tips to Manage Attacks
Practical Cyber Threat Intelligence
Knowing your threat actors together with your weaknesses and the technology will master your defense Key Features ? Gain practical experience with cyber threat intelligence by using the book's lab sections. ? Improve your CTI skills by designing a threat intelligence system. ? Assisting you in bridging the gap between cybersecurity teams. ? Developing your knowledge of Cyber Intelligence tools and how to choose them. Description When your business assets are threatened or exposed to cyber risk, you want a high-quality threat hunting team armed with cutting-edge threat intelligence to build the shield. Unfortunately, regardless of how effective your cyber defense solutions are, if you are unfamiliar with the tools, strategies, and procedures used by threat actors, you will be unable to stop them.This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information.The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause. What you will learn ? Hands-on experience in developing a powerful and robust threat intelligence model. ? Acquire the ability to gather, exploit, and leverage adversary data. ? Recognize the difference between bad intelligence and good intelligence. ? Creating heatmaps and various visualization reports for better insights. ? Investigate the most typical indicators of security compromise. ? Strengthen your analytical skills to understand complicated threat scenarios better. Who this book is for The book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly. Table of Contents 1. Basics of Threat Analysis and Modeling 2. Formulate a Threat Intelligence Model 3. Adversary Data Collection Sources & Methods 4. Pivot Off and Extracting Adversarial Data 5. Primary Indicators of Security Compromise 6. Identify & Build Indicators of Compromise 7. Conduct Threat Assessments In Depth 8. Produce Heat Maps, Infographics & Dashboards 9. Build Reliable & Robust Threat Intelligence System 10. Learn Statistical Approaches for Threat Intelligence 11. Develop Analytical Skills for Complex Threats 12. Planning for Disaster
Understanding security issues
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.  This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
The art of memory forensics
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields.
Tangled Web
The Tangled Web is destined to be the definitive guide to web application security. Rather than simply enumerate known vulnerabilities or lay down a series of commandments from on high, famed security expert Michal Zalewski takes an in-depth look at how browsers actually work, how to leverage their features, and what pitfalls lurk in the shadows. An outgrowth of Zalewski’s work on Google’s online Browser Security Handbook, The Tangled Web sheds light on the uniqueness of the security challenges that engineers, developers, and users face on the Web today. The book opens with a detailed examination of browser security mechanisms, the historical reasons behind their design, and their security consequences. Subsequent chapters discuss the security aspects of specific web technologies, including URLs, HTTP, HTML, JavaScript, the same-origin policy, and HTML5. Readers looking for quick answers will appreciate the cheat sheets in each chapter, which outline the most commonly encountered problems and how to tackle them. An appendix offers a glossary of well-known implementation vulnerabilities.
Black hat Python : Python programming for hackers and pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You’ll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate com­mon malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
Practical malware analysis : the hands-on guide to dissecting malicious software
There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware authors use to thwart attempts to reverse engineer their programs. Key chapters include a lab at the end, which reviews important concepts from the discussion in the context of real-world malware examples. Drawn from the authors’ extensive field experience combating malware, these labs make Practical Malware Analysis the perfect teaching tool for beginners and seasoned veterans alike.