Shane Hartman - Böcker
Visar alla böcker från författaren Shane Hartman. Handla med fri frakt och snabb leverans.
2 produkter
2 produkter
686 kr
Tillfälligt slut
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.This tactical and practical book shows you how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how you can apply static analysis to break apart the application/malware using reverse engineering tools and techniques to recreate the actual code and algorithms used.The book presents the insights of experts in the field, who have already sized up the best tools, tactics, and procedures for recognizing and analyzing Android malware threats quickly and effectively. You also get access to an online library of tools that supplies what you will need to begin your own analysis of Android malware threats. Tools available on the book’s site include updated information, tutorials, code, scripts, and author assistance.This is not a book on Android OS, fuzz testing, or social engineering. Instead, it is about the best ways to analyze and tear apart Android malware threats. After reading the book, you will be able to immediately implement the tools and tactics covered to identify and analyze the latest evolution of Android threats.Updated information, tutorials, a private forum, code, scripts, tools, and author assistance are available at AndroidRisk.com for first-time owners of the book.
Hands-On Ethical Hacking Tactics
Strategies, tools, and techniques for effective cyber defense
Häftad, Engelska, 2024
621 kr
Skickas inom 5-8 vardagar
Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat huntingKey FeaturesExplore essential tools and techniques to ethically penetrate and safeguard digital environmentsSet up a malware lab and learn how to detect malicious code running on the networkUnderstand different attacker types, their profiles, and mindset, to enhance your cyber defense planPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIf you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.What you will learnUnderstand the core concepts and principles of ethical hackingGain hands-on experience through dedicated labsExplore how attackers leverage computer systems in the digital landscapeDiscover essential defensive technologies to detect and mitigate cyber threatsMaster the use of scanning and enumeration toolsUnderstand how to hunt and use search information to identify attacksWho this book is forHands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.