Computer viruses, Trojans and worms Books

Sidebar Sidebar Sidebar
  • The Cybersecurity Self-Help Guide The Cybersecurity Self-Help Guide
    Add to Cart The item has been added

    The Cybersecurity Self-Help Guide

    This book is an up-to-date self-help guide on Cybersecurity for everyone who connects to the Internet and uses technology. It is an effort to spread awareness about Cybersecurity by explaining techniques and methods to be implemented practically by...
    $282.00

    Add to Cart The item has been added
  • Nan's Secret Password Book Nan's Secret Password Book
    Add to Cart The item has been added

    Nan's Secret Password Book

    A special gift for Nan!A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password...
    $22.00

    Add to Cart The item has been added
  • Grandad's Secret Password Book Grandad's Secret Password Book
    Add to Cart The item has been added

    Grandad's Secret Password Book

    A special gift for Grandad!A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password...
    $22.00

    Add to Cart The item has been added
  • Navigating Cybersecurity Navigating Cybersecurity
    Add to Cart The item has been added

    Navigating Cybersecurity

    Our lives are now deeply intertwined with the digital world, and technology's power has given us access to unparalleled levels of convenience, connectivity, and creativity. The increasing danger of cyber threats is the dark side of this digital...
    $37.00

    Add to Cart The item has been added
  • Digital Forensics and Incident Response - Second Edition Digital Forensics and Incident Response - Second Edition
    Add to Cart The item has been added

    Digital Forensics and Incident Response - Second Edition

    Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey Features:- Create a solid incident response framework and manage cyber incidents effectively- Perform malware analysis for...
    $131.00

    Add to Cart The item has been added
  • Modern Cryptography for Cybersecurity Professionals Modern Cryptography for Cybersecurity Professionals
    Add to Cart The item has been added

    Modern Cryptography for Cybersecurity Professionals

    As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at...
    $93.00

    Add to Cart The item has been added
  • Cybersecurity Career Master Plan Cybersecurity Career Master Plan
    Add to Cart The item has been added

    Cybersecurity Career Master Plan

    Get started with cybersecurity and progress with the help of expert tips to get certified, find a job, and moreKey Features:Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurityExplore expert tips...
    $109.00

    Add to Cart The item has been added
  • DevSecOps DevSecOps
    Add to Cart The item has been added

    DevSecOps

    A structured approach to integrating security capabilities into your engineering process is an essential requirement for producing secure software without compromising the integrity of the DevOps framework.DevSecOps provides a...
    $36.00

    Add to Cart The item has been added
  • Computer Hacking Computer Hacking
    Add to Cart The item has been added

    Computer Hacking

    COMPUTER HACKINGComputer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking. Inside, you will learn the basics of hacking for beginners.This includes the different types of hacking,...
    $18.00

    Add to Cart The item has been added
  • Business Intelligence in Economic Forecasting Business Intelligence in Economic Forecasting
    Add to Cart The item has been added

    Business Intelligence in Economic Forecasting

    With the rapid development of economic globalization and information technology, the field of economic forecasting continues its expeditious advancement, providing business and government with applicable technologies. Business Intelligence in Economic...
    $407.00

    Add to Cart The item has been added
  • The Psychology of Cyber Crime The Psychology of Cyber Crime
    Add to Cart The item has been added

    The Psychology of Cyber Crime

    As more individuals own and operate Internet-enabled devices and more critical government and industrial systems rely on advanced technologies, the issue of cybercrime has become a crucial concern for both the general public and professionals alike. The...
    $441.00

    Add to Cart The item has been added
  • Privacy, Intrusion Detection and Response Privacy, Intrusion Detection and Response
    Add to Cart The item has been added

    Privacy, Intrusion Detection and Response

    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response:...
    $441.00

    Add to Cart The item has been added
  • Cyber Crime and the Victimization of Women Cyber Crime and the Victimization of Women
    Add to Cart The item has been added

    Cyber Crime and the Victimization of Women

    While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber...
    $441.00

    Add to Cart The item has been added
  • Security and Privacy Assurance in Advancing Technologies Security and Privacy Assurance in Advancing Technologies
    Add to Cart The item has been added

    Security and Privacy Assurance in Advancing Technologies

    Recent advances in computing and communication networks allow us to utilize information technology in ways previously unimaginable. In order for us to take full advantage of the possibilities offered by these new technologies, organizations, governmental...
    $407.00

    Add to Cart The item has been added
  • Cyber Security, Cyber Crime and Cyber Forensics Cyber Security, Cyber Crime and Cyber Forensics
    Add to Cart The item has been added

    Cyber Security, Cyber Crime and Cyber Forensics

    Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing,...
    $407.00

    Add to Cart The item has been added
  • Cyberwatch 101 Cyberwatch 101
    Add to Cart The item has been added

    Cyberwatch 101

    Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your...
    $91.00

    Add to Cart The item has been added
  • OSINT Commando OSINT Commando
    Add to Cart The item has been added

    OSINT Commando

    ����️‍♂️ OSINT COMMANDO Book Bundle ����Are you ready to unlock the secrets of the digital world and become a master of Open-Source Intelligence (OSINT)? Look no further! Introducing the OSINT COMMANDO Book Bundle, your ultimate guide to penetrating...
    $91.00

    Add to Cart The item has been added
  • AWS Security Cookbook - Second Edition AWS Security Cookbook - Second Edition
    Add to Cart The item has been added

    AWS Security Cookbook - Second Edition

    Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, while following cloud security best practicesKey Features:- Explore useful recipes for implementing robust cloud security solutions on...
    $98.00

    Add to Cart The item has been added
  • Hack the Cybersecurity Interview - Second Edition Hack the Cybersecurity Interview - Second Edition
    Add to Cart The item has been added

    Hack the Cybersecurity Interview - Second Edition

    Uncover the secrets to acing interviews, decode the diverse roles in cybersecurity, and soar to new heights with expert adviceKey Features:- Confidently handle technical and soft skill questions across various cybersecurity roles- Prepare for...
    $85.00

    Add to Cart The item has been added
  • Mastering Cybersecurity Ethics Mastering Cybersecurity Ethics
    Add to Cart The item has been added

    Mastering Cybersecurity Ethics

    Cybersecurity has become a significant concern in a world that is becoming more digitally linked. Technology's explosive growth has given rise to previously unheard-of advantages and opportunities, but it has also made us vulnerable to increasing threats...
    $37.00

    Add to Cart The item has been added
  • Pentest+ Exam Pass Pentest+ Exam Pass
    Add to Cart The item has been added

    Pentest+ Exam Pass

    ���� Become a Certified Penetration Tester! ����Are you ready to level up your cybersecurity skills and become a certified penetration tester? Look no further! ����Introducing the ultimate resource for cybersecurity professionals: the "PENTEST+ EXAM...
    $92.00

    Add to Cart The item has been added
  • Kali Linux CLI Boss Kali Linux CLI Boss
    Add to Cart The item has been added

    Kali Linux CLI Boss

    ���� Introducing the "Kali Linux CLI Boss" Book Bundle: From Novice to Command Line Maestro ����Are you ready to master the world of cybersecurity and become a true command line expert? Look no further! Dive into the "Kali Linux CLI Boss" book bundle, a...
    $91.00

    Add to Cart The item has been added
  • Endpoint Detection and Response Essentials Endpoint Detection and Response Essentials
    Add to Cart The item has been added

    Endpoint Detection and Response Essentials

    Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategyKey FeaturesLearn how to tackle endpoint security problems in your...
    $89.00

    Add to Cart The item has been added
  • A Non-Techie Beginners' Guide to Cybersecurity and Privacy A Non-Techie Beginners' Guide to Cybersecurity and Privacy
    Add to Cart The item has been added

    A Non-Techie Beginners' Guide to Cybersecurity and Privacy

    If you are worried about falling victim to cyber threats and having your sensitive data compromised, then keep reading...Are you tired of constantly worrying about hackers getting into your personal information and compromising your online privacy?Do you...
    $58.00

    Add to Cart The item has been added
  • Redes de ordenadores y ciberseguridad Redes de ordenadores y ciberseguridad
    Add to Cart The item has been added

    Redes de ordenadores y ciberseguridad

    Dos manuscritos en un libro:Redes Informáticas: Una Guía Compacta para el principiante que Desea Entender los Sistemas de Comunicaciones, la Seguridad de las Redes, Conexiones de Internet, Ciberseguridad y PirateríaCiberseguridad: Una Simple Guía para...
    $49.00

    Add to Cart The item has been added
  • Simplificando la Ciberseguridad Simplificando la Ciberseguridad
    Add to Cart The item has been added

    Simplificando la Ciberseguridad

    A medida que la tecnología impregna cada vez más nuestras vidas, la seguridad digital ha adquirido una importancia vital. "Simplificando la Ciberseguridad" ofrece una introducción accesible a la ciberseguridad dirigida específicamente a quienes se...
    $19.00

    Add to Cart The item has been added
  • Securing Remote Access in Palo Alto Networks Securing Remote Access in Palo Alto Networks
    Add to Cart The item has been added

    Securing Remote Access in Palo Alto Networks

    Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishingKey Features:Learn the ins and outs of advanced Palo Alto features and troubleshoot any situation with easeBecome well-versed...
    $103.00

    Add to Cart The item has been added
  • Mobile Forensics - Advanced Investigative Strategies Mobile Forensics - Advanced Investigative Strategies
    Add to Cart The item has been added

    Mobile Forensics - Advanced Investigative Strategies

    Master powerful strategies to acquire and analyze evidence from real-life scenariosKey Features:A straightforward guide to address the roadblocks face when doing mobile forensicsSimplify mobile forensics using the right mix of methods, techniques, and...
    $114.00

    Add to Cart The item has been added
  • iOS Forensics for Investigators iOS Forensics for Investigators
    Add to Cart The item has been added

    iOS Forensics for Investigators

    Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey Features:Explore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts,...
    $98.00

    Add to Cart The item has been added
  • Operationalizing Threat Intelligence Operationalizing Threat Intelligence
    Add to Cart The item has been added

    Operationalizing Threat Intelligence

    Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey Features:Develop and implement a threat intelligence program from scratchDiscover techniques to perform cyber threat intelligence,...
    $98.00

    Add to Cart The item has been added
  • Mastering Defensive Security Mastering Defensive Security
    Add to Cart The item has been added

    Mastering Defensive Security

    An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurityKey Features:Get hold of the best defensive security strategies and...
    $114.00

    Add to Cart The item has been added
  • Malware Analysis Techniques Malware Analysis Techniques
    Add to Cart The item has been added

    Malware Analysis Techniques

    Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malwareKey Features:Investigate, detect, and respond to various types of malware threatUnderstand how to use what...
    $114.00

    Add to Cart The item has been added
  • MentalTheft MentalTheft
    Add to Cart The item has been added

    MentalTheft

    Any IT or physical security expert will tell you that the weakest link in any system are the people using it. As an expert in utilising the weaknesses of the human mind, Paul Newton - magician, mind reader, hypnotist, public...
    $33.00

    Add to Cart The item has been added
  • Practical Memory Forensics Practical Memory Forensics
    Add to Cart The item has been added

    Practical Memory Forensics

    A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey Features:Explore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware...
    $93.00

    Add to Cart The item has been added
  • The Foundations of Threat Hunting The Foundations of Threat Hunting
    Add to Cart The item has been added

    The Foundations of Threat Hunting

    Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey Features:Learn foundational concepts for effective threat hunting teams in pursuit of cyber...
    $81.00

    Add to Cart The item has been added
Computer viruses, Trojans and worms