Create account Create free account
Sign in
  • Home
    • Business
    • Career development
    • Data
    • Design
    • Hardware
    • Math Science Engineering
    • Other
    • Security
    • Software Development
    • System Administration
    • Travel Hobbies
    • Web Mobile
    • Recommendation
    • Trending Now

eBook Reading

Search Button
All Ebooks
Free Ebooks
Premium Ebooks
  • Title: A to Z
  • Title: Z to A
  • Release Date: Newest to Oldest
  • Release Date: Oldest to Newest
  • View ↓
  • View ↑

Search Results

1 - 30 of 32 results

Filter
Categories
  • All (35603)
  • Security(1455)
    • Malware(32)
Malware Analysis Techniques Ebook only for VIP member

Malware Analysis Techniques

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware Ebook only for VIP member

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

Abhijit Mohanta, Anoop Saldanha

The Ghidra Book Ebook only for VIP member

The Ghidra Book

Chris Eagle, Kara Nance

Getting Started with Ghidra Ebook only for VIP member

Getting Started with Ghidra

Matthew Berninger, Ric Messier

Mastering Malware Analysis Ebooks for all member

Mastering Malware Analysis

Alexey Kleymenov, Amr Thabet

Malware Data Science Ebooks for all member

Malware Data Science

Hillary Sanders, Joshua Saxe

Learning Malware Analysis Ebook only for VIP member

Learning Malware Analysis

Monnappa K A

Preventing Ransomware Ebook only for VIP member

Preventing Ransomware

Kumaraguru Velmurugan, Mounir Hahad, Abhijit Mohanta

Big Data Analytics with Applications in Insider Threat Detection Ebooks for all member

Big Data Analytics with Applications in Insider Threat Detection

Latifur Khan, Mohammad Mehedy Masud, Pallabi Parveen, Bhavani Thuraisingham

Windows Virus and Malware Troubleshooting Ebook only for VIP member

Windows Virus and Malware Troubleshooting

Mike Halsey, Andrew Bettany

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition Ebooks for all member

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition

Aaron LeMasters, Sean M. Bodmer, Michael A. Davis, Christopher C. Elisan

Ransomware Ebooks for all member

Ransomware

Timothy Gallo, Allan Liska

Advanced Malware Analysis Ebook only for VIP member

Advanced Malware Analysis

Christopher Elisan

Windows Malware Analysis Essentials Ebooks for all member

Windows Malware Analysis Essentials

Victor Marak

How to Defeat Advanced Malware Ebook only for VIP member

How to Defeat Advanced Malware

Simon Cros, Henry Dalziel

The 2011 Fukushima Nuclear Power Plant Accident Ebooks for all member

The 2011 Fukushima Nuclear Power Plant Accident

Kenji Iino, Naoto Kasahara, Masao Fuchigami, Seiji Abe, Yotaro Hatamura

Detecting and Combating Malicious Email Ebooks for all member

Detecting and Combating Malicious Email

Cade Kamachi, Julie JCH Ryan

Android Malware and Analysis Ebooks for all member

Android Malware and Analysis

Tim Strazzere, Jose Andre Morales, Manu Quintans, Shane Hartman, Ken Dunham

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory Ebooks for all member

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters

Cuckoo Malware Analysis Ebooks for all member

Cuckoo Malware Analysis

Iqbal Muhardianto, Digit Oktavianto

The Momentum Effect Ebook only for VIP member

The Momentum Effect

Jean Claude Larreche

Instant Encore DVD 1.5 Ebooks for all member

Instant Encore DVD 1.5

Douglas Spotted Eagle

The Snowball Effect: Communication Techniques to Make You Unstoppable Ebooks for all member

The Snowball Effect: Communication Techniques to Make You Unstoppable

Andy Bounds

Practical Malware Analysis Ebooks for all member

Practical Malware Analysis

Andrew Honig, Michael Sikorski

The Truth About Computer Scams Ebook only for VIP member

The Truth About Computer Scams

Steve Weisman

The Jelly Effect: How to make your communication stick Ebooks for all member

The Jelly Effect: How to make your communication stick

Andy Bounds

The Connect Effect Ebooks for all member

The Connect Effect

Mike Dulworth, Michael Dulworth

Home Network Security Simplified Ebooks for all member

Home Network Security Simplified

Nathan Clement, Neil Anderson, Jim Doherty

Malicious Cryptography: Exposing Cryptovirology Ebooks for all member

Malicious Cryptography: Exposing Cryptovirology

Moti Yung, Adam Young

Malware: Fighting Malicious Code Ebooks for all member

Malware: Fighting Malicious Code

Lenny Zeltser, Ed Skoudis

  • Malware Analysis Techniques by Ebook only for VIP member

    Malware Analysis Techniques

    Author
    Release Date 2021/06

    Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malwareKey FeaturesInvestigate, detect, and respond to various types of malware threatUnderstand how to use what you've learned as an analyst to produce actio....
  • Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware by Abhijit Mohanta, 
            Anoop Saldanha Ebook only for VIP member

    Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware

    Author Abhijit Mohanta , Anoop Saldanha
    Release Date 2020/09

    Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engi....
  • The Ghidra Book by Chris Eagle, 
            Kara Nance Ebook only for VIP member

    The Ghidra Book

    Author Chris Eagle , Kara Nance
    Release Date 2020/08

    The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the wo....
  • Getting Started with Ghidra by Matthew Berninger, Ric Messier Ebook only for VIP member

    Getting Started with Ghidra

    Author Matthew Berninger , Ric Messier
    Release Date 2019/10

    There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze mal....
  • Mastering Malware Analysis by Alexey Kleymenov, 
            Amr Thabet Ebooks for all member

    Mastering Malware Analysis

    Author Alexey Kleymenov , Amr Thabet
    Release Date 2019/06

    Master malware analysis to protect your systems from getting infectedKey FeaturesSet up and model solutions, investigate malware, and prevent it from occurring in future Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more A pract....
  • Malware Data Science by Hillary Sanders, Joshua Saxe Ebooks for all member

    Malware Data Science

    Author Hillary Sanders , Joshua Saxe
    Release Date 2018/09

    "Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, ....
  • Learning Malware Analysis by Monnappa K A Ebook only for VIP member

    Learning Malware Analysis

    Author Monnappa K A
    Release Date 2018/06

    Understand malware analysis and its practical implementationAbout This BookExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactic....
  • Preventing Ransomware by Kumaraguru Velmurugan, Mounir Hahad, Abhijit Mohanta Ebook only for VIP member

    Preventing Ransomware

    Author Kumaraguru Velmurugan , Mounir Hahad , Abhijit Mohanta
    Release Date 2018/03

    Your one-stop guide to know digital extortion and it's prevention.About This BookA complete guide to how ransomware worksBuild a security mechanism to prevent digital extortion.A practical approach to knowing about, and responding to, ransomware.Who This Book Is F....
  • Big Data Analytics with Applications in Insider Threat Detection by Latifur Khan, Mohammad Mehedy Masud, Pallabi Parveen, Bhavani Thuraisingham Ebooks for all member

    Big Data Analytics with Applications in Insider Threat Detection

    Author Latifur Khan , Mohammad Mehedy Masud , Pallabi Parveen , Bhavani Thuraisingham
    Release Date 2017/11

    Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malwa....
  • Windows Virus and Malware Troubleshooting by Mike Halsey, Andrew Bettany Ebook only for VIP member

    Windows Virus and Malware Troubleshooting

    Author Mike Halsey , Andrew Bettany
    Release Date 2017/03

    Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.Whatever version of Windows you're using, the threat of virus and malware infection is always a com....
  • Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition by Aaron LeMasters, Sean M. Bodmer, Michael A. Davis, Christopher C. Elisan Ebooks for all member

    Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition

    Author Aaron LeMasters , Sean M. Bodmer , Michael A. Davis , Christopher C. Elisan
    Release Date 2016/12

    Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed™ Malware and Rootki....
  • Ransomware by Timothy Gallo, Allan Liska Ebooks for all member

    Ransomware

    Author Timothy Gallo , Allan Liska
    Release Date 2016/12

    The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what st....
  • Advanced Malware Analysis by Christopher Elisan Ebook only for VIP member

    Advanced Malware Analysis

    Author Christopher Elisan
    Release Date 2015/09

    A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting....
  • Windows Malware Analysis Essentials by Victor Marak Ebooks for all member

    Windows Malware Analysis Essentials

    Author Victor Marak
    Release Date 2015/09

    Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand ....
  • How to Defeat Advanced Malware by Simon Cros, Henry Dalziel Ebook only for VIP member

    How to Defeat Advanced Malware

    Author Simon Cros , Henry Dalziel
    Release Date 2014/12

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverage....
  • The 2011 Fukushima Nuclear Power Plant Accident by Kenji Iino, Naoto Kasahara, Masao Fuchigami, Seiji Abe, Yotaro Hatamura Ebooks for all member

    The 2011 Fukushima Nuclear Power Plant Accident

    Author Kenji Iino , Naoto Kasahara , Masao Fuchigami , Seiji Abe , Yotaro Hatamura
    Release Date 2014/11

    In March 2011 the Fukushima nuclear power plant (NPP) in Japan was hit by an earthquake and subsequent tsunami which resulted in the release of significant amounts of radioactive material. The incident led to the suspension of nuclear programmes by a number of count....
  • Detecting and Combating Malicious Email by Cade Kamachi, Julie JCH Ryan Ebooks for all member

    Detecting and Combating Malicious Email

    Author Cade Kamachi , Julie JCH Ryan
    Release Date 2014/10

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully au....
  • Android Malware and Analysis by Tim Strazzere, Jose Andre Morales, Manu Quintans, Shane Hartman, Ken Dunham Ebooks for all member

    Android Malware and Analysis

    Author Tim Strazzere , Jose Andre Morales , Manu Quintans , Shane Hartman , Ken Dunham
    Release Date 2014/10

    The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach t....
  • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters Ebooks for all member

    The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

    Author Michael Hale Ligh , Andrew Case , Jamie Levy , AAron Walters
    Release Date 2014/07

    Memory forensics provides cutting edge technology to help investigate digital attacksMemory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malwa....
  • Cuckoo Malware Analysis by Iqbal Muhardianto, Digit Oktavianto Ebooks for all member

    Cuckoo Malware Analysis

    Author Iqbal Muhardianto , Digit Oktavianto
    Release Date 2013/10

    Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skillsUnderstand the risk of the rise of document-based malwareEnhance your malware analysis concepts through illustrations, tips and tricks, step-by-s....
  • The Momentum Effect by Jean Claude Larreche Ebook only for VIP member

    The Momentum Effect

    Author Jean Claude Larreche
    Release Date 2013/09

    One of the most frequent challenges that managers and executives face today is: ‘How do I keep on growing and at the same time, make a profit?’ Based on the author’s extensive research on over 350 Fortune 1000 Firms, The Momentum Effect proves that the old method of....
  • Instant Encore DVD 1.5 by Douglas Spotted Eagle Ebooks for all member

    Instant Encore DVD 1.5

    Author Douglas Spotted Eagle
    Release Date 2013/04

    Carefully detailed screen shots and step-by-step directions illustrate how to use Encore DVD software in a time-efficient way. Readers learn to harness the full scope of Encore DVD's functions, including importing and organizing content to build the DVD, using....
  • The Snowball Effect: Communication Techniques to Make You Unstoppable by Andy Bounds Ebooks for all member

    The Snowball Effect: Communication Techniques to Make You Unstoppable

    Author Andy Bounds
    Release Date 2013/03

    The long-awaited follow-up to the international bestseller The Jelly EffectCommunication is supposed to cause something. That's the point of it. So, what do you want to achieve following your communication? Do you want someone to answer 'yes'? Do you want to impr....
  • Practical Malware Analysis by Andrew Honig, Michael Sikorski Ebooks for all member

    Practical Malware Analysis

    Author Andrew Honig , Michael Sikorski
    Release Date 2012/02

    For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software t....
  • The Truth About Computer Scams by Steve Weisman Ebook only for VIP member

    The Truth About Computer Scams

    Author Steve Weisman
    Release Date 2010/11

    This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
  • The Jelly Effect: How to make your communication stick by Andy Bounds Ebooks for all member

    The Jelly Effect: How to make your communication stick

    Author Andy Bounds
    Release Date 2010/09

    Like throwing jelly at a wall, poor communication never sticks.Too much information and not enough relevance is a problem that pervades almost all business communication. So what's the answer? More relevance and a lot less jelly.The Jelly Effect teaches you simple,....
  • The Connect Effect by Mike Dulworth, Michael Dulworth Ebooks for all member

    The Connect Effect

    Author Mike Dulworth , Michael Dulworth
    Release Date 2008/01

    Networking is a critically important skill, but few people are aware of its power or know how to develop, maintain, and leverage networks over their lifetime. In The Connect Effect, Michael Dulworth reveals the surprising ways personal, professional, and virtua....
  • Home Network Security Simplified by Nathan Clement, Neil Anderson, Jim Doherty Ebooks for all member

    Home Network Security Simplified

    Author Nathan Clement , Neil Anderson , Jim Doherty
    Release Date 2006/07

    A straightforward, graphic-based reference for securing your home network Set up a firewallSecure your wireless networkStop adware and spywareKeep your children safe from online threatsPrevent a virus outbreakAvoid Internet scams Phishing. Malware. Spyware. Trojan h....
  • Malicious Cryptography: Exposing Cryptovirology by Moti Yung, Adam Young Ebooks for all member

    Malicious Cryptography: Exposing Cryptovirology

    Author Moti Yung , Adam Young
    Release Date 2004/02

    Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subver....
  • Malware: Fighting Malicious Code by Lenny Zeltser, Ed Skoudis Ebooks for all member

    Malware: Fighting Malicious Code

    Author Lenny Zeltser , Ed Skoudis
    Release Date 2003/11

    Reveals how attackers install malicious code and how they evade detectionShows how you can defeat their schemes and keep your computers and network safe!Details viruses, worms, backdoors, Trojan horses, RootKits, and other threatsExplains how to handle today's thre....
1 2 Next
  • Recommended
  • Privacy Policy
  • About