1-24 of 90 Books
Big Data Analytics with Applications in Insider Threat Detection
Big Data Analytics with Applications in Insider Threat Detection
By Pallabi Parveen,Bhavani Thuraisingham,Mohammad Mehedy Masud,Latifur Khan
Data mining tools for malware detection
Data mining tools for malware detection
By Mehedy Masud

Artificial Intelligence and Security Challenges in Emerging Networks
By Ryma Abassi
Technology and the Law on the Use of Force
Technology and the Law on the Use of Force
By Jackson Maogoto

Mastering Malware Analysis
By Alexey Kleymenov,Amr Thabet

Cyberterrorism After STUXNET
By Thomas M. Chen,. Strategic Studies Institute (U.S.),. Army War College (U.S.),Douglas C. Lovelace Jr.
Cisco Next-Generation Security Solutions
Cisco Next-Generation Security Solutions
By Omar Santos,Andrae Middleton,Eric Howard,Neal Humphrey,Panos Kampanakis

The Art of Memory Forensics
By Andrew Case,Michael Hale Ligh,Jamie Levy,Aaron Walters
Behold a Pale Farce
Behold a Pale Farce
By Bill Blunden,Violet Cheung
Cuckoo Malware Analysis
Cuckoo Malware Analysis
By Digit Oktavianto,Iqbal Muhardianto
Detection of Intrusions and Malware, and Vulnerability Assessment
Detection of Intrusions and Malware, and Vulnerability Assessment
By Sven Dietrich

Spring Security 3.1
By Robert Winch,Peter Mularien

Honeypot Frameworks and Their Applications
By Chee Keong NG,Lei Pan,Yang Xiang
Malware Diffusion Models for Modern Complex Networks
Malware Diffusion Models for Modern Complex Networks
By Vasileios Karyotis,M. H. R. Khouzani
OS X Incident Response
OS X Incident Response
By Jaron Bradley

How to Defeat Advanced Malware
By Henry Dalziel,Simon Crosby

Practical Reverse Engineering
By Bruce Dang,Alexandre Gazet,Elias Bachaalany

AVIEN malware defense guide for the Enterprise
By David Harley,Ken Bechtel,Michael Blanchard,Henk K. Diemer,Andrew Lee,Igor Muttik,Bojan Zdrnja