Related Books

Attribution of Advanced Persistent Threats
Language: en
Pages: 207
Authors: Timo Steffens
Categories: Computers
Type: BOOK - Published: 2020-07-20 - Publisher: Springer Nature

DOWNLOAD EBOOK

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of
Malware Data Science
Language: en
Pages: 274
Authors: Joshua Saxe
Categories: Computers
Type: BOOK - Published: 2018-09-25 - Publisher: No Starch Press

DOWNLOAD EBOOK

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "b
Cyber Security
Language: en
Pages: 184
Authors: Xiaochun Yun
Categories: Computers
Type: BOOK - Published: 2019-02-19 - Publisher: Springer

DOWNLOAD EBOOK

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, i
Cyber Mercenaries
Language: en
Pages: 267
Authors: Tim Maurer
Categories: Law
Type: BOOK - Published: 2018-01-18 - Publisher: Cambridge University Press

DOWNLOAD EBOOK

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have be
Intelligence-Driven Incident Response
Language: en
Pages: 286
Authors: Scott J Roberts
Categories: Computers
Type: BOOK - Published: 2017-08-21 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate.