Quantcast
Channel: Books Archive - AV-Comparatives
Browsing latest articles
Browse All 12 View Live

The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense

View Article



The Antivirus Hacker’s Handbook

The Antivirus Hacker’s Handbook Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker’s Handbook guides you through the process of reverse engineering antivirus software....

View Article

Cyberwarfare Sourcebook

CYBERWARFARE SOURCEBOOK Concerning application layer DDoS attacks, Bureau 121, camfecting, cyber attack threat trends, ECHELON, Fifth Dimension Operations, Intervasion of the UK, Military-digital...

View Article

A Bug Hunter’s Diary

A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and...

View Article

The Art of Deception: Controlling the Human Element of Security

The Art of Deception: Controlling the Human Element of Security The world’s most infamous hacker offers an insider’s view of thelow-tech threats to high-tech securityKevin Mitnick’s exploits as a...

View Article


Understanding Cryptography

Understanding Cryptography: A Textbook for Students and Practitioners Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems,...

View Article

Thinking Security

Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series) If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and...

View Article

Countdown to Zero Day

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and...

View Article


Learning Malware Analysis

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and...

View Article


Image may be NSFW.
Clik here to view.

Books

In this post, we showcase some books that could be of interest to IT-security professionals, tech enthusiasts and even sci-fi fans. There are (non-affiliate) links that let you buy each book from...

View Article
Browsing latest articles
Browse All 12 View Live




Latest Images