Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
29,539
result(s) for
"COMPUTERS - Security - Viruses."
Sort by:
Ransomware : defending against digital extortion
by
Liska, Allan, author
,
Gallo, Tim, author
in
Computer security.
,
Computer crimes Prevention.
,
Malware (Computer software)
2016
\"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place\"--Back cover.
A Cyberworm that Knows No Boundaries
by
McKay, Shawn
,
Porche III, Isaac R
,
Sollinger, Jerry M
in
Computer networks
,
Computer security
,
Computer viruses, Trojans and worms
2011
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Real-world bug hunting : a field guide to web hacking
\"Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbucks. As you read each report, you'll gain deeper insight into how the vulnerabilities work and how you might find similar ones. Each chapter begins with an explanation of a vulnerability type, then moves into a series of real bug bounty reports that show how the bugs were found. You'll learn things like how Cross-Site Request Forgery tricks users into unknowingly submitting information to websites they are logged into; how to pass along unsafe JavaScript to execute Cross-Site Scripting; how to access another user's data via Insecure Direct Object References; how to trick websites into disclosing information with Server Side Request Forgeries; and how bugs in application logic can lead to pretty serious vulnerabilities. Yaworski also shares advice on how to write effective vulnerability reports and develop relationships with bug bounty programs, as well as recommends hacking tools that can make the job a little easier\"-- Provided by publisher.
Cyber Security
by
David Sutton
in
COMPUTERS
2022
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen.
Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation.
• A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession
• Offers practical guidance and actionable steps for individuals and businesses to protect themselves
• Highly accessible and terminology is clearly explained and supported with current, real-world examples
Gray day : my undercover mission to expose America's first cyber spy
by
O'Neill, Eric, author
in
O'Neill, Eric.
,
Hanssen, Robert.
,
United States. Federal Bureau of Investigation.
2019
\"A cybersecurity expert and former FBI 'ghost' tells the ... story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyberspy\"-- Provided by publisher.
Understanding security issues
by
Williams, Chris
,
Siegel, Stanley
,
Donaldson, Scott
in
COM015000 COMPUTERS / Security / Viruses & Malware
,
COM018000 COMPUTERS / Data Processing
,
COM060040 COMPUTERS / Security / Online Safety & Privacy
2019,2018
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
Breaking Ransomware
by
Narula, Jitender
,
Narula, Atul
in
COM015000 COMPUTERS / Security / Viruses & Malware
,
Computer science
,
COMPUTERS / Computer Simulation
2023
Crack a ransomware by identifying and exploiting weaknesses in its design
Key Features
? Get an overview of the current security mechanisms available to prevent ransomware digital extortion.
? Explore different techniques to analyze a ransomware attack.
? Understand how cryptographic libraries are misused by malware authors to code ransomwares.
Description
Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you. This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption. By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware.
What you will learn
? Get familiar with the structure of Portable Executable file format.
? Understand the crucial concepts related to Export Directory and Export Address Table.
? Explore different techniques used for ransomware static and dynamic analysis.
? Learn how to investigate a ransomware attack.
? Get expert tips to mitigate ransomware attacks.
Who this book is for
This book is for cybersecurity professionals and malware analysts who are responsible for mitigating malware and ransomware attacks. This book is also for security professionals who want to learn how to prevent, detect, and respond to ransomware attacks. Basic knowledge of C/C++, x32dbg and Reverse engineering skills is a must.
Table of Contents
Section I: Ransomware Understanding
1. Warning Signs, Am I Infected?
2. Ransomware Building Blocks
3. Current Defense in Place
4. Ransomware Abuses Cryptography
5. Ransomware Key Management
Section II: Ransomware Internals
6. Internal Secrets of Ransomware
7. Portable Executable Insides
8. Portable Executable Sections
Section III: Ransomware Assessment
9. Performing Static Analysis
10. Perform Dynamic Analysis
Section IV: Ransomware Forensics
11. What's in the Memory
12. LockCrypt 2.0 Ransomware Analysis
13. Jigsaw Ransomware Analysis
Section V: Ransomware Rescue
14. Experts Tips to Manage Attacks
Practical Cyber Threat Intelligence
by
Dr. Erdal Ozkaya
in
COM015000 COMPUTERS / Security / Viruses & Malware
,
COM053000 COMPUTERS / Security / General
,
Computer software
2022
Knowing your threat actors together with your weaknesses and the technology will master your defense
Key Features
? Gain practical experience with cyber threat intelligence by using the book's lab sections.
? Improve your CTI skills by designing a threat intelligence system.
? Assisting you in bridging the gap between cybersecurity teams.
? Developing your knowledge of Cyber Intelligence tools and how to choose them.
Description
When your business assets are threatened or exposed to cyber risk, you want a high-quality threat hunting team armed with cutting-edge threat intelligence to build the shield. Unfortunately, regardless of how effective your cyber defense solutions are, if you are unfamiliar with the tools, strategies, and procedures used by threat actors, you will be unable to stop them.This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information.The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause.
What you will learn
? Hands-on experience in developing a powerful and robust threat intelligence model.
? Acquire the ability to gather, exploit, and leverage adversary data.
? Recognize the difference between bad intelligence and good intelligence.
? Creating heatmaps and various visualization reports for better insights.
? Investigate the most typical indicators of security compromise.
? Strengthen your analytical skills to understand complicated threat scenarios better.
Who this book is for
The book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly.
Table of Contents
1. Basics of Threat Analysis and Modeling
2. Formulate a Threat Intelligence Model
3. Adversary Data Collection Sources & Methods
4. Pivot Off and Extracting Adversarial Data
5. Primary Indicators of Security Compromise
6. Identify & Build Indicators of Compromise
7. Conduct Threat Assessments In Depth
8. Produce Heat Maps, Infographics & Dashboards
9. Build Reliable & Robust Threat Intelligence System
10. Learn Statistical Approaches for Threat Intelligence
11. Develop Analytical Skills for Complex Threats
12. Planning for Disaster
The art of memory forensics
by
Ligh, Michael Hale
,
Walters, AAron
,
Case, Andrew
in
Computer crimes
,
Computer crimes. fast (OCoLC)fst00872063
,
Computer networks
2014
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields.