Computer viruses, Trojans & worms

How to Not Screw Up Your Organization's Security

Proactive Success


Victimware: The Missing Part of the Equation

Dmitry Vostokov


Mastering Your Introduction to Cyber Security

PhD Redmond Dr Michael C


Malware Forensics: Investigating and Analyzing Malicious Code

Cameron H. Malin, USA) Casey MD Baltimore cmdLabs Eoghan (Eoghan Casey, et al.





Malware Analysis and Detection Engineering: A Comprehensive...

Abhijit Mohanta and Anoop Saldanha


Computer Forensics with FTK

Fernando Carbone


CISSP: The Complete Beginner's Guide to Learn the...

Preston Robert Preston


Strengthening the EU's Cyber Defence Capabilities

Melissa K. Griffith, Steven Blockmans, et al.


Constraint-based Analysis of Security Properties

Beata Sarna-Starosta


Malware Analyst's Cookbook and DVD: Tools and Techniques for...

Steven Adair, Blake Hartstein, et al.


Pattern-Oriented Memory Forensics: A Pattern Language Approach

Dmitry Vostokov, Software Diagnostics Services, et al.



Andrew Rajan


Worm: The First Digital World War

Mark Bowden

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to help detect unauthorized access or activity that violate our terms of service, as well as to analyze site traffic and performance for our own site improvement efforts. To learn more about these methods, including how to disable them view our Cookie Policy.