- Cybersecurity Threats,Malware Trends,and Strategies
- Tim Rains
- 138字
- 2021-06-30 14:49:10
Why subscribe?
- Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals
- Learn better with Skill Plans built especially for you
- Get a free eBook or video every month
- Fully searchable for easy access to vital information
- Copy and paste, print, and bookmark content
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.Packt.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at customercare@packtpub.com for more details.
At www.Packt.com, you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.
Contributors
About the author
Tim Rains worked at Microsoft for the better part of two decades where he held a number of roles, including Global Chief Security Advisor, Director of Security, Identity and Enterprise Mobility, Director of Trustworthy Computing, and was a founding technical leader of Microsoft's customer facing Security Incident Response team.
Currently, Tim works at Amazon Web Services as Regional Leader, Security and Compliance Business Acceleration for Europe, the Middle East and Africa.
Tim lives with his wife Brenda and their two sons Tristan and Liam in London, England.
I'd like to thank my wife Brenda for her encouragement, assistance, and patience, without which this book would not have been written. Yuri Diogenes, thank you for your encouragement. Thank you Dr. ir Johannes Drooghaag for being our Technical Reviewer and to the entire team at Packt.
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- Kali Linux Social Engineering
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 白帽子講Web安全(紀(jì)念版)
- Penetration Testing with Perl
- .NET安全攻防指南(上冊)
- Kali Linux Network Scanning Cookbook(Second Edition)
- 模糊測試:強(qiáng)制發(fā)掘安全漏洞的利器
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- Digital Forensics with Kali Linux
- 學(xué)電腦安全與病毒防范
- 情報(bào)驅(qū)動應(yīng)急響應(yīng)
- 信息安全導(dǎo)論(第2版)
- 電腦安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- INSTANT Apple Configurator How-to