Tag: Detecting

Evasive Malware A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats


Free Download Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats by Kyle Cucci
English | September 10, 2024 | ISBN: 1718503261 | 488 pages | AZW3 | 62 Mb
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.

(more…)

Jolly Good Detecting Humor in English Crime Fiction of the Golden Age


Free Download Bruce Shaw, "Jolly Good Detecting: Humor in English Crime Fiction of the Golden Age"
English | ISBN: 0786478861 | 2013 | 324 pages | EPUB | 1323 KB
This book is an appreciation of selected authors who make extensive use of humor in English detective/crime fiction. Works using humor as an amelioration of the serious have their heyday in the Golden Age of crime writing but they belong also to a long tradition. There is an identifiable lineage of humorous writing in crime fiction that ranges from mild wit to outright farce, burlesque, even slapstick. A mix of entertainment with instruction is a tradition in English letters.

(more…)

Detecting and Mitigating AI-Generated Misinformation


Free Download Detecting and Mitigating AI-Generated Misinformation: A Professional’s Guide by Rosey Press
English | July 13, 2024 | ISBN: N/A | ASIN: B0D9G3XQJN | 41 pages | EPUB | 0.21 Mb
The rise of AI-generated content has become a significant concern in recent years, particularly in the context of elections. Deepfakes, which are highly realistic videos created using artificial intelligence, have the potential to spread misinformation and manipulate public opinion. This trend highlights the need for robust measures to detect and mitigate the spread of AI-generated disinformation in political campaigns.

(more…)

Insider Threat Hunting Detecting and Responding to Internal Security Risks


Free Download Insider Threat Hunting Detecting and Responding to Internal Security Risks
Released 7/2024
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 34m | Size: 71 MB
In today’s cybersecurity landscape, mitigating risk is crucial, and that starts with awareness of threats coming from those within the organization. In this specialized course, strategic cybersecurity leader Michael Wylie covers a critical topic: insider threat hunting. Insider threats encompass a range of malicious activities undertaken by individuals within an organization, who have inside information concerning the organization’s security practices, data, and systems. Dive into the knowledge and skills that you need to identify, assess, and mitigate risks posed by insider threats within an organization. Learn how to build an insider threat hunting framework. Explore a variety of ways to hunt for and detect insider threat risks. Plus, find out how you can use AI to hunt for insider threats.

(more…)

Detecting Data Anomalies using Deep Learning Techniques with TensorFlow 2.4


Free Download Detecting Data Anomalies using Deep Learning Techniques with TensorFlow 2.4
Andrei Pruteanu | Duration: 1:32 h | Video: H264 1280×720 | Audio: AAC 48 kHz 2ch | 176 MB | Language: English
This course will teach you how to create deep-learning algorithms for detecting and mitigating anomalies in data such as time series.
What you’ll learn
In this course, Detecting Data Anomalies using Deep Learning Techniques with TensorFlow 2.4, you’ll learn to spot specific patterns in large datasets that can be labelled as anomalies. First, you’ll explore how to precisely define anomalies in data. Next, you’ll discover detection algorithms. Finally, you’ll learn how to mitigate anomalous data. When you’re finished with this course, you’ll have the skills and knowledge of creating machine learning algorithms needed for dealing with various anomalies in data.

(more…)