Category: Security & Encryption

Security & Encryption

Evasive Malware: Understanding Deceptive and Self-Defending Threats 0

Evasive Malware: Understanding Deceptive and Self-Defending Threats

eBook Details: Paperback: 488 pages Publisher: WOW! eBook (September 10, 2024) Language: English ISBN-10: 1718503261 ISBN-13: 978-1718503267 eBook Description: Evasive Malware: Understanding Deceptive and Self-Defending Threats Get up to speed on state-of-the-art malware with this Evasive Malware: Understanding Deceptive and Self-Defending Threats first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use...

Acing the CCNA Exam, Volume 1: Fundamentals and Protocols 0

Acing the CCNA Exam, Volume 1

eBook Details: Paperback: 608 pages Publisher: WOW! eBook (August 13, 2024) Language: English ISBN-10: 1633437671 ISBN-13: 978-1633437678 eBook Description: Acing the CCNA Exam, Volume 1: Fundamentals and Protocols: Master the core fundamentals and protocols covered in the Cisco Certified Network Associate (CCNA) exam! Acing the CCNA Exam, Volume 1: Fundamentals and Protocols helps you prepare for the CCNA exam by learning vital skills like: How to study for the CCNA IP routing, addressing, and subnetting VLANs, trunking protocols, and EtherChannel Static and dynamic routing protocols (OSPF) Passing the CCNA is the perfect way to kickstart or advance your career in IT, networking,...

Decentralized Identity Explained 0

Decentralized Identity Explained

eBook Details: Paperback: 392 pages Publisher: WOW! eBook (July 19, 2024) Language: English ISBN-10: 1804617636 ISBN-13: 978-1804617632 eBook Description: Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience. Delve into the cutting-edge trends of decentralized identities, blockchains, and other digital identity management technologies and leverage them to craft seamless digital experiences for both your customers and employees. Looking forward to mastering digital identity? This Decentralized Identity Explained book will help you get to grips with complete frameworks, tools, and strategies for safeguarding personal data, securing online transactions, and ensuring trust in digital interactions in today’s cybersecurity landscape. Decentralized Identity...

Cryptography: Algorithms, Protocols, and Standards for Computer Security 0

Cryptography: Algorithms, Protocols, and Standards for Computer Security

eBook Details: Paperback: 624 pages Publisher: WOW! eBook (March 26, 2024) Language: English ISBN-10: 1394207484 ISBN-13: 978-1394207480 eBook Description: Cryptography: Algorithms, Protocols, and Standards for Computer Security: An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by...

Privacy in the Age of Innovation: AI Solutions for Information Security 0

Privacy in the Age of Innovation

eBook Details: Paperback: 213 pages Publisher: WOW! eBook (July 18, 2024) Language: English ISBN-10: 8868804601 ISBN-13: 978-8868804601 eBook Description: Privacy in the Age of Innovation: AI Solutions for Information Security This Privacy in the Age of Innovation: AI Solutions for Information Security book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security. The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it gives you important information about the basics of AI, machine learning, and...