Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Malicious Bots, Dunham, Ken , Melnick, Jim


Варианты приобретения
Цена: 9033.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Dunham, Ken , Melnick, Jim
Название:  Malicious Bots
ISBN: 9780367387037
Издательство: Taylor&Francis
Классификация:
ISBN-10: 0367387034
Обложка/Формат: Paperback
Страницы: 168
Вес: 0.68 кг.
Дата издания: 27.09.2019
Язык: English
Размер: 231 x 155 x 8
Читательская аудитория: Undergraduate
Основная тема: Information / Knowledge Management
Подзаголовок: An Inside Look into the Cyber-Criminal Underground of the Internet
Рейтинг:
Поставляется из: Европейский союз
Описание: Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of botmasters. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots.

With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book!

With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer.

Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote



Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems

Автор: David A. P.
Название: Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems
ISBN: 1800207972 ISBN-13(EAN): 9781800207974
Издательство: Неизвестно
Рейтинг:
Цена: 13792.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project


Key Features:

  • Make the most of Ghidra on different platforms such as Linux, Windows, and macOS
  • Leverage a variety of plug-ins and extensions to perform disassembly, assembly, decompilation, and scripting
  • Discover how you can meet your cybersecurity needs by creating custom patches and tools


Book Description:

Ghidra, an open source software reverse engineering (SRE) framework created by the NSA research directorate, enables users to analyze compiled code on any platform, whether Linux, Windows, or macOS. This book is a starting point for developers interested in leveraging Ghidra to create patches and extend tool capabilities to meet their cybersecurity needs.


You'll begin by installing Ghidra and exploring its features, and gradually learn how to automate reverse engineering tasks using Ghidra plug-ins. You'll then see how to set up an environment to perform malware analysis using Ghidra and how to use it in the headless mode. As you progress, you'll use Ghidra scripting to automate the task of identifying vulnerabilities in executable binaries. The book also covers advanced topics such as developing Ghidra plug-ins, developing your own GUI, incorporating new process architectures if needed, and contributing to the Ghidra project.


By the end of this Ghidra book, you'll have developed the skills you need to harness the power of Ghidra for analyzing and avoiding potential vulnerabilities in code and networks.


What You Will Learn:

  • Get to grips with using Ghidra's features, plug-ins, and extensions
  • Understand how you can contribute to Ghidra
  • Focus on reverse engineering malware and perform binary auditing
  • Automate reverse engineering tasks with Ghidra plug-ins
  • Become well-versed with developing your own Ghidra extensions, scripts, and features
  • Automate the task of looking for vulnerabilities in executable binaries using Ghidra scripting
  • Find out how to use Ghidra in the headless mode


Who This Book Is For:

This SRE book is for developers, software engineers, or any IT professional with some understanding of cybersecurity essentials. Prior knowledge of Java or Python, along with experience in programming or developing applications, is required before getting started with this book.

Development of an Malicious Insider Composite Vulnerability Assessment Methodology

Автор: King William H.
Название: Development of an Malicious Insider Composite Vulnerability Assessment Methodology
ISBN: 1288315740 ISBN-13(EAN): 9781288315741
Издательство: Неизвестно
Рейтинг:
Цена: 10658.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Report of the Trial of an Action Brought by Mrs. Sarah Bingham Against the REV. John Gardiner, D.D. for a Malicious Libel, Imputing to Her That She Ha

Автор: Anonymous
Название: Report of the Trial of an Action Brought by Mrs. Sarah Bingham Against the REV. John Gardiner, D.D. for a Malicious Libel, Imputing to Her That She Ha
ISBN: 127548803X ISBN-13(EAN): 9781275488038
Издательство: Неизвестно
Цена: 2448.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Report of the Case of Charles Stearns Against J. W. Ripley, in the Circuit Court of the United States, at Boston, November Term, 1850, for Malicious P

Автор: Sprague Judge
Название: Report of the Case of Charles Stearns Against J. W. Ripley, in the Circuit Court of the United States, at Boston, November Term, 1850, for Malicious P
ISBN: 1275543774 ISBN-13(EAN): 9781275543775
Издательство: Неизвестно
Цена: 2586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

The Tryals, Convictions & Sentence of Titusotes, Upon Two Indictments for Willful, Malicious, and Corrupt Perjury

Автор: Jeffreys George Lord
Название: The Tryals, Convictions & Sentence of Titusotes, Upon Two Indictments for Willful, Malicious, and Corrupt Perjury
ISBN: 1275311571 ISBN-13(EAN): 9781275311572
Издательство: Неизвестно
Цена: 2586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting

Автор: Alrabaee Saed, Debbabi Mourad, Shirani Paria
Название: Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
ISBN: 3030342409 ISBN-13(EAN): 9783030342401
Издательство: Springer
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.

Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting

Автор: Alrabaee Saed, Debbabi Mourad, Shirani Paria
Название: Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting
ISBN: 3030342379 ISBN-13(EAN): 9783030342371
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.

A Letter from a Student in Grub-Street, to a Reverend High-Priest in Oxford. Containing an Account of a Malicious Design to Blacken Him and Several of

Автор: Amhurst N.
Название: A Letter from a Student in Grub-Street, to a Reverend High-Priest in Oxford. Containing an Account of a Malicious Design to Blacken Him and Several of
ISBN: 1385398248 ISBN-13(EAN): 9781385398241
Издательство: Неизвестно
Цена: 5508.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

An Account of the Trial of Alexander Whyte, Baker, for a False, Malicious, and Seditious Libel; Of Which Charge He Was Honourably Acquitted, at the Qu

Автор: Anonymous
Название: An Account of the Trial of Alexander Whyte, Baker, for a False, Malicious, and Seditious Libel; Of Which Charge He Was Honourably Acquitted, at the Qu
ISBN: 1241379750 ISBN-13(EAN): 9781241379759
Издательство: Неизвестно
Цена: 2713.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Malicious Objects, Anger Management, and the Question of Modern Literature

Автор: Jorg Kreienbrock
Название: Malicious Objects, Anger Management, and the Question of Modern Literature
ISBN: 0823245292 ISBN-13(EAN): 9780823245291
Издательство: Wiley EDC
Рейтинг:
Цена: 4288.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Why do humans get angry with objects? Why is it that a malfunctioning computer, a broken tool, or a fallen glass causes an outbreak of fury? How is it possible to speak of an inanimate object’s recalcitrance, obstinacy, or even malice? When things assume a will of their own and seem to act out against human desires and wishes rather than disappear into automatic, unconscious functionality, the breakdown is experienced not as something neutral but affectively—as rage or as outbursts of laughter. Such emotions are always psychosocial: public, rhetorically performed, and therefore irreducible to a “private” feeling.
By investigating the minutest details of life among dysfunctional household items through the discourses of philosophy and science, as well as in literary works by Laurence Sterne, Jean Paul, Friedrich Theodor Vischer, and Heimito von Doderer, Kreienbrock reconsiders the modern bourgeois poetics that render things the way we know and suffer them.

Malicious Objects, Anger Management, and the Question of Modern Literature

Автор: Jorg Kreienbrock
Название: Malicious Objects, Anger Management, and the Question of Modern Literature
ISBN: 0823245284 ISBN-13(EAN): 9780823245284
Издательство: Wiley EDC
Рейтинг:
Цена: 14071.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Why do humans get angry with objects? Why is it that a malfunctioning computer, a broken tool, or a fallen glass causes an outbreak of fury? How is it possible to speak of an inanimate object’s recalcitrance, obstinacy, or even malice? When things assume a will of their own and seem to act out against human desires and wishes rather than disappear into automatic, unconscious functionality, the breakdown is experienced not as something neutral but affectively—as rage or as outbursts of laughter. Such emotions are always psychosocial: public, rhetorically performed, and therefore irreducible to a “private” feeling.
By investigating the minutest details of life among dysfunctional household items through the discourses of philosophy and science, as well as in literary works by Laurence Sterne, Jean Paul, Friedrich Theodor Vischer, and Heimito von Doderer, Kreienbrock reconsiders the modern bourgeois poetics that render things the way we know and suffer them.

That D----d Brownlow: Being a Saucy and Malicious Description of Fighting Parson William Gannaway Brownlow

Автор: Steve Humphrey
Название: That D----d Brownlow: Being a Saucy and Malicious Description of Fighting Parson William Gannaway Brownlow
ISBN: 1469638223 ISBN-13(EAN): 9781469638225
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 3742.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Published in 1978, this book tells the story of William Gannaway Brownlow, a Methodist minister, Whig politician, author of a Civil War bestseller, and anti-Confederate who documented the trials and tribulations of pro-Union mountaineers in east Tennessee. Steve Humphrey tells the story of this man who could be relentless with his enemies and generous with his friends.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия