Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramat…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Get your PC running at full speed again--and remove malevolent softwareSave yourself time, money, and frustr…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Practice the Computer Security Skills You Need to Succeed!40+ lab exercises challenge you to solve problems bas…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Cutting-edge social engineering testing techniques"Provides all of the core areas and nearly everything [you] ne…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A new exam guide for the new certification on mobile computing technologies from CompTIAPrepare for CompTIA …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Operational, tested information security and privacypractices for the healthcare environmentWritten by an ex…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless networ…
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Best practices for protecting critical data and systemsInformation Assurance Handbook: Effective Computer Se…