Best Computer Viruses Books

Well technically all books are good to learn about computer virus and all books are bad to learn about computer viruses.

1. CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt, 2nd Edition

Author: by Ian Neil
Packt Publishing
516 pages

View on Amazon

Become well-versed with IT security essentials and exam objectives for CompTIA Security+ SY0-601 certificationKey FeaturesWritten by Ian Neil, one of the world’s top CompTIA Security+ trainersTest your knowledge of security jargon and acronyms with self-assessment and realistic exam questionsLearn about cryptography, encryption, and security policies to deliver a robust infrastructureBook DescriptionThe CompTIA Security+ certification confirms that you have the fundamental knowledge required to perform core security functions and pursue a career in IT security.

Authored by Ian Neil, a world-class CompTIA Security+ 601 trainer, this book is a best-in-class study guide that fully covers the CompTIA Security+ 601 exam objectives. Complete with self-assessment scenarios and realistic exam questions, this guide will help you master the core concepts to pass the exam the first time you take it.

With the help of relevant examples, you’ll learn about fundamental security concepts, from certificates and encryption to identity and access management (IAM). You’ll then delve into the important domains of the exam, namely, cloud security, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, and cryptography and public key infrastructure (PKI).

2. This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

Author: by Nicole Perlroth
Bloomsbury Publishing
February 9, 2021

View on Amazon

Part John le Carr and more parts Michael Crichton …Spellbinding. The New Yorker From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy’s arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).

For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.U.S. Government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence.

Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.

3. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601))

Author: by Wm. Arthur Conklin
McGraw-Hill Education
784 pages

View on Amazon

This fully updated study guide covers every topic on the current version of the CompTIA Security+ examGet complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software.

You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam domains, including:Threats, Attacks, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceOnline content includes:250 practice exam questionsTest engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain

4. CompTIA Security+ Study Guide: Exam SY0-601

Author: by Mike Chapple
672 pages

View on Amazon

Learn the key objectives and most crucial concepts covered by the Security+ Exam SY0-601 with this comprehensive and practical study guide! An online test bank offers 650 practice questions and flashcards! The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam.

Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance The study guide comes with the Sybex online, interactive learning environment offering 650 practice questions!

Includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms. The book is written in a practical and straightforward manner, ensuring you can easily learn and retain the material. Perfect for everyone planning to take the SY0-601 Examas well as those who hope to secure a high-level certification like the CASP+, CISSP, or CISAthe study guide also belongs on the bookshelves of everyone who has ever wondered if the field of IT security is right for them.

5. Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)

Author: by Mike Meyers
McGraw-Hill Education
832 pages

View on Amazon

An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), the leading expert on CompTIA certification and training brings his highly effective methodology to IT security.

Within each chapter, modules drill down on specific exam objectives, providing a clear learning path. All official exam objectives are covered, and chapter-ending practice exam questions reinforce the concepts presented. This practical resource goes beyond knowledge application and teaches you the skills you need to anticipate security risks and guard against them.

Covers all the exam topics, including:Risk managementCryptographyAuthentication and authorizationHost, LAN, and application securityWireless, cloud, and mobile securityEnvironmental security and controlsOnline content includes:200+ practice exam questions in a customizable test engineOne hour+ of video training from Mike MeyersFree lab simulationsMike’s toolbox of favorite network securityrelated freeware and shareware

6. CompTIA CySA+ Study Guide Exam CS0-002

Author: by Mike Chapple

‎ 720 pages

View on Amazon

This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics! Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) exam objectives?

It’s all in the CompTIA CySA+ Study Guide Exam CS0-002, Second Edition! This guide provides clear and concise information on crucial security topics. You’ll be able to gain insight from practical, real-world examples, plus chapter reviews and exam highlights.

Turn to this comprehensive resource to gain authoritative coverage of a range of security subject areas. Review threat and vulnerability management topics Expand your knowledge of software and systems security Gain greater understanding of security operations and monitoring Study incident response information Get guidance on compliance and assessment The CompTIA CySA+ Study Guide, Second Edition connects you to useful study tools that help you prepare for the exam.

7. Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

Author: by Dan Borges
246 pages

View on Amazon

Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition. Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand advanced red team and blue team techniques with code examplesLearn to battle in short-term memory, whether remaining unseen (red teams) or monitoring an attacker’s traffic (blue teams)Book DescriptionLittle has been written about what to do when live hackers are on your system and running amok.

Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.

This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts.

8. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

Author: by Andy Greenberg
Anchor (October 20, 2020)

‎ English
368 pages

View on Amazon

The true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it, from Wired senior writer Andy Greenberg. Lays out in chilling detail how future wars will be waged in cyberspace and makes the case that we have done little, as of yet, to prevent it.

Washington PostIn 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world’s largest businessesfrom drug manufacturers to software developers to shipping companies.

At the attack’s epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damagethe largest, most destructive cyberattack the world had ever seen.

9. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Author: by Michael Sikorski
800 pages

View on Amazon

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts.

With this book as your guide, you’ll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You’ll learn how to:Set up a safe virtual environment to analyze malwareQuickly extract network signatures and host-based indicatorsUse key analysis tools like IDA Pro, OllyDbg, and WinDbgOvercome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniquesUse your newfound knowledge of Windows internals for malware analysisDevelop a methodology for unpacking malware and get practical experience with five of the most popular packersAnalyze special cases of malware with shellcode, C++, and 64-bit codeHands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it.

10. Cybersecurity Essentials

Author: by Charles J. Brooks

View on Amazon

Up-to-date coverage of every topic on the CEH v10 examThoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam.

You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference. Covers all exam topics, including:Ethical hacking fundamentalsReconnaissance and footprintingScanning and enumerationSniffing and evasionAttacking a systemHacking web servers and applicationsWireless network hackingSecurity in cloud computingTrojans and other attacksCryptographySocial engineering and physical securityPenetration testingDigital content includes:300 practice exam questionsTest engine that provides full-length practice exams and customized quizzes by chapter

12. CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003)

Author: by Nicholas Lane
McGraw-Hill Education
848 pages

View on Amazon

Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam by the experts!

Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk.

You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Also includes a voucher coupon for a 10% discount on your CompTIA exam!

Covers all exam domains, including:Threats, attacks, and vulnerabilitiesTechnologies and tools Architecture and designIdentity and access management Risk managementCryptography and PKIOnline content includes:200 realistic practice exam questionsInteractive performance-based question quiz

13. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Author: by Kim Zetter

View on Amazon

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfareone in which a digital attack can have the same destructive capability as a megaton bomb.

Immensely enjoyable … Zetter turns a complicated and technical cyber story into an engrossing whodunit. The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destructionin this case, on an Iranian nuclear facility.

In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iranand telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making.

14. Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming

Author: by Matthew Hickey
608 pages

View on Amazon

A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author’s years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks.

This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data.

Once the information gathering stage is complete, you’ll look for flaws and their known exploitsincluding tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities.

15. Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools

Author: by Valentina Palacín
398 pages

View on Amazon

Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat hunting process and understand the environmentPerform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasetsBook DescriptionThreat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.

This book is not only an introduction for those who don’t know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch.

You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you’ll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools.