https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/10/LMA2.png?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-10-01 00:51:182018-10-03 14:45:50A Book Review of “Learning Malware Analysis” by Monnappa KA
I found “Learning Malware Analysis” to be very informative, easy to read as well as follow, moreover I found the examples in the book easy to replicate which was priceless.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/08/PCI4.jpg?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-08-31 12:55:592018-10-03 14:59:58Book Review of “Practical Cyber Intelligence” by Wilson Bautista Jr
Bautista’s approach of the book “Practical Cyber Intelligence” was comprehensive for both the beginner and seasoned security practitioner regardless of their role. I do think seasoned professional in leadership will find more value in the text as compared to a Jr. Security Analyst. In addition, as an educator, this text definitely has a role in the academic realm especially in the graduate level.
https://i1.wp.com/www.securityorb.com/wp-content/uploads/2014/04/CuckooAnalysis.jpg?fit=500%2C617&ssl=1 617 500 admin https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png admin2014-04-08 12:48:112016-07-20 22:19:37Cuckoo Malware Analysis by Digit Oktavianto and Iqbal Muhardianto: A Review
I had the opportunity to review and conduct some interesting hands-on examples from Packt Publishing’s “Cuckoo Malware Analysis” by Digit Oktavianto and Iqbal Muhardianto. This book was divided into five intuitive chapters consisting of:
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2014/01/mobile-security-offer.jpg?fit=764%2C499&ssl=1 499 764 admin https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png admin2014-01-15 13:18:362016-07-20 22:20:41A Book Review of Mobile Security: How to Secure, Privatize, and Recover Your Device
The “Mobile Security: How to Secure, Privatize, and Recover Your Devices” by Tim Speed, Joseph Anderson, Darla Nykamp, Jaya Nampalli and Mari Heiser, published by Packt Publishing contains an abundance of information pertaining to the threats mobile devices are susceptible to as well as providing guidelines on how protect them from the assorted threats.