Tags
Language
Tags

Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin

Posted By: AvaxGenius
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin

Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin by Paul C. van Oorschot
English | PDF | 2021 | 464 Pages | ISBN : 3030834107 | 9.3 MB

Building on the core strengths of the inaugural book, this second edition of a uniquely accessible textbook provides a concise, yet comprehensive overview of computer and Internet security. It builds on the design principles to address security-related error patterns that have plagued software and system designs for more than 50 years.

Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop (repost)

Posted By: hill0
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop (repost)

Python Ethical Hacking from Scratch:
Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware

English | 2021 | ISBN: 1838829504 | 202 Pages | PDF MOBI EPUB | 33 MB

Android Malware Detection using Machine Learning

Posted By: hill0
Android Malware Detection using Machine Learning

Android Malware Detection using Machine Learning: Data-Driven Fingerprinting and Threat Intelligence
English | 2021 | ISBN: 3030746631 | 216 Pages | PDF EPUB | 170 MB

Malware Analysis Techniques: Tricks for the triage of adversarial software

Posted By: yoyoloit
Malware Analysis Techniques: Tricks for the triage of adversarial software

Malware Analysis Techniques
by Barker, Dylan;

English | 2021 | ISBN: 1839212276, 9781839212277 | 282 pages | True PDF | 14.67 MB

Malware Analysis Techniques: Tricks for the triage of adversarial software

Posted By: yoyoloit
Malware Analysis Techniques: Tricks for the triage of adversarial software

Malware Analysis Techniques
by Dylan Barker

English | 2021 | ISBN: 1839212276 | 282 pages | EPUB | 20.96 MB

Reverse Engineering & Malware Analysis of .NET & Java

Posted By: lucky_aut
Reverse Engineering & Malware Analysis of .NET & Java

Reverse Engineering & Malware Analysis of .NET & Java
Duration: 2h 58m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 1.36 GB
Genre: eLearning | Language: English

A Beginner's Course on Reverse Engineering and Analyzing Malicious .NET and Java Executable Files

Introduction To Reverse Engineering And Malware Analysis

Posted By: lucky_aut
Introduction To Reverse Engineering And Malware Analysis

Introduction To Reverse Engineering And Malware Analysis
Duration: 3h 49m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.09 GB
Genre: eLearning | Language: English

Purple Team Courses Part 2 Intorduction To Malware Analysis

Ransomware Revolution: The Rise of a Prodigious Cyber Threat

Posted By: AvaxGenius
Ransomware Revolution: The Rise of a Prodigious Cyber Threat

Ransomware Revolution: The Rise of a Prodigious Cyber Threat by Matthew Ryan
English | PDF,EPUB | 2021 | 164 Pages | ISBN : 3030665828 | 13.5 MB

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks.

Malware Analysis & Incident Response for IT Technicians

Posted By: ELK1nG
Malware Analysis & Incident Response for IT Technicians

Malware Analysis & Incident Response for IT Technicians
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 14 lectures (32m) | Size: 124.9 MB

Learn the best way to prevent and respond to IT security incidents on your organisation's network

Data Mining Tools for Malware Detection

Posted By: hill0
Data Mining Tools for Malware Detection

Data Mining Tools for Malware Detection
by Mehedy Masud

English | 2012 | ISBN: 1439854548 | 680 Pages | PDF | 9 MB

Cybersecurity Threats, Malware Trends, and Strategies

Posted By: hill0
Cybersecurity Threats, Malware Trends, and Strategies

Cybersecurity Threats, Malware Trends, and Strategies: Mitigate exploits, malware, phishing, and other social engineering attacks
by Tim Rains

English | 2020 | ISBN: 1800206011 | 428 Pages | PDF EPUB MOBI | 15 MB

Malware Analysis Using Artificial Intelligence and Deep Learning

Posted By: AvaxGenius
Malware Analysis Using Artificial Intelligence and Deep Learning

Malware Analysis Using Artificial Intelligence and Deep Learning by Mark Stamp
English | PDF | 2021 | 655 Pages | ISBN : 3030625818 | 22.5 MB

​This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed.

Cyber Security Incident Response Wannacry Ransomware

Posted By: lucky_aut
Cyber Security Incident Response Wannacry Ransomware

Cyber Security Incident Response Wannacry Ransomware
Duration: 5h 24m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 3.66 GB
Genre: eLearning | Language: English

Analysis of the Wannacry Ransomware in a lab environment.

Machine Learning Approaches in Cyber Security Analytics

Posted By: AvaxGenius
Machine Learning Approaches in Cyber Security Analytics

Machine Learning Approaches in Cyber Security Analytics by Tony Thomas
English | EPUB | 2020 | 217 Pages | ISBN : 9811517053 | 30.5 MB

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks.

Expert Malware Analysis and Reverse Engineering

Posted By: Sigha
Expert Malware Analysis and Reverse Engineering

Expert Malware Analysis and Reverse Engineering
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 2.97 GB
Genre: eLearning Video | Duration: 36 lectures (4 hour, 4 mins) | Language: English

Beginner to Expert series on Malware analysis and reverse engineering concepts