Skip to main content alibris logo

Computers Viruses Books

Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark Wireless Exploits And...

Rob Botwright
Buy from $43.31

Ceh V11 Certified Ethical Hacker Study Guide Ceh V11 Certified Ethical...

Ric Messier
Buy from $14.77

Mr. Robot and Philosophy: Beyond Good and Evil Corp Mr. Robot and Philosophy:...

Richard Greene (Editor), Rachel Robison-Greene (Editor)
Buy from $12.11

Cybersecurity Risk Management Cybersecurity Risk Management

Cynthia Brumfield
Buy from $107.69

Malware Reverse Engineering: Cracking The Code Malware Reverse Engineering:...

Rob Botwright
Buy from $43.31

Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level Microsoft Defender for...

Paul Huijbregts, Joe Anich
Buy from $26.77

Microsoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security Microsoft Unified XDR and...

Raghu Boddu, Sami Lamppu
Buy from $51.93

Automotive Cybersecurity Engineering Handbook: The automotive engineer's roadmap to cyber-resilient vehicles Automotive Cybersecurity...

Dr. Ahmad MK Nasser
Buy from $56.23

Ceh Certified Ethical Hacker All-In-One Exam Guide, Fourth Edition Ceh Certified Ethical Hacker...

Matt Walker
Buy from $10.69

Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Effective Threat...

Mostafa Yahia
Buy from $56.23

Scrappy Information Security: A Plain-English Tour Through the World of Intranets, the Internet, Packets, Headers, Ports, Acs, Routers, Bridges, Firewalls, Intrusion Detection Systems, Network Architecture, Encryption, Access Cards and Biometrics... Scrappy Information Security:...

Michael Seese, Kimberly Wiefling (Editor)
Buy from $17.63

Under Attack Under Attack

The World's Leading Experts
Buy from $16.89

Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs Operationalizing Threat...

Kyle Wilhoit, Joseph Opacki
Buy from $49.36

Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them Incident Response Techniques...

Oleg Skulkin
Buy from $45.99

Android Security Internals: An In-Depth Guide to Android's Security Architecture Android Security Internals:...

Nikolay Elenkov
Buy from $14.60

EC-Council Certified Ethical Hacker - (Practice Exams) EC-Council Certified Ethical...

Robert Karamagi
Buy from $33.16

Implementing Palo Alto Networks PrismaĞ Access: Learn real-world network protection Implementing Palo Alto...

Tom Piens Aka 'Reaper', Rutger Truyers (Foreword by)
Buy from $56.23

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict Adversarial Tradecraft in...

Dan Borges
Buy from $37.94

Malware Analysis Techniques: Tricks for the triage of adversarial software Malware Analysis Techniques:...

Dylan Barker
Buy from $35.36

Stepping Through Cybersecurity Risk Management Stepping Through...

Jennifer L Bayuk
Buy from $88.58

Intelligence-Driven Incident Response: Outwitting the Adversary Intelligence-Driven Incident...

Scott Roberts, Rebekah Brown
Buy from $12.55

The Art of Attack: Attacker Mindset for Security Professionals The Art of Attack: Attacker...

Maxie Reynolds
Buy from $25.11

Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats Rootkits and Bootkits:...

Alex Matrosov, Eugene Rodionov
Buy from $30.66

The Psychology of Cyber Crime: Concepts and Principles The Psychology of Cyber Crime...

Grainne Kirwan
Buy from $205.27

  1. < Prev
  2. 1
  3. ...
  4. 4
  5. 5
  6. 6
  7. ...
  8. 21
  9. Next >