Computer Viruses, Trojans & Worms

Sort these publications by...

Results Found

Pentesting Con Kali

Pentesting Con Kali

  • Author: Santo Orcero, David

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Metasploit for Beginners

Metasploit for Beginners

  • Author: Rahalkar, Sagar

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Metasploit Bootcamp

Metasploit Bootcamp

  • Author: Jaswal, Nipun

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Solving Information Assurance Issues Using Defense in Depth Measures and the Analytical Hiearchy Process

Advanced Image-Based Spam Detection and Filtering Techniques

Advanced Image-Based Spam Detection and Filtering Techniques

  • Author: Dhavale, Sunita Vikrant

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Ransomware: Defending Against Digital Extortion

Ransomware: Defending Against Digital Extortion

  • Author: Liska, Allan Gallo, Timothy ...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Combating Security Breaches and Criminal Activity in the Digital Sphere

Dark Territory: The Secret History of Cyber War

Dark Territory: The Secret History of Cyber War

  • Author: Kaplan, Fred

In Stock: 3 - 5 days Availability help (opens in new window)

The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

  • Author: Koret, Joxean Bachaalany, Eli...

Usually dispatched within 1 - 4 weeks Availability help (opens in new window)

Countdown To Zero Day

Countdown To Zero Day

  • Author: Zetter, Kim

In Stock: 3 - 5 days Availability help (opens in new window)