23 results - showing 1 - 20
1 2
Ordering
Books 312

Books

Year published
As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that...
Books 314

Books

Year published
Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under...
Books 373

Books

Year published
Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud...
Books 373

Books

Year published
In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis,...
Books 326

Books

Year published
First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts....
Books 417

Books

Year published
SQLite is a self-contained SQL database engine that is used on every smartphone (including all iOS and Android...
Books 383

Books

Year published
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation,...
23 results - showing 1 - 20
1 2
Results per page: