Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Art of Mac Malware, The: The Guide to Analyzing Malicious Software
The Art of Mac Malware: The Guide to Analyzing Malicious Software
Advanced Malware Analysis
Malware Science: A comprehensive guide to detection, analysis, and compliance
Malware Data Science: Attack Detection and Attribution
Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks, 2nd Edition
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st Edition
The Android Malware Handbook: Using Manual Analysis and ML-Based Detection
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
The Android Malware Handbook: Detection and Analysis by Human and Machine
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware 1st ed. Edition
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Malware Analysis Techniques: Tricks for the triage of adversarial software
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Malware Analysis Techniques: Tricks for the triage of adversarial software
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Hidden Potential of DNS In Security: Combating Malware, Data Exfiltration, and more - The Guide for Security Professionals
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems
Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
NIST Cybersecurity Framework (CSF) for Information Systems Security
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
The Ultimate Kali Linux Book: Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
Python Programming and SQL: 5 books in 1 - The #1 Coding Course from Beginner to Advanced. Learn it Well & Fast (2024) (Computer Programming)
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Python for Cybersecurity Cookbook: 80+ practical recipes for detecting, defending, and responding to Cyber threats (English Edition)
Digital Forensics with Kali Linux - Second Edition: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux
Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats to your organization
How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Planet) Paperback – April 17, 2017