Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Provides a technology-based survey of methods and techniques that leaves the reader without an understanding of the interrelationships between methods and techniques. This title offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information.
Serves as a security practitioner's guide to crucial issues in cyber security and IT infrastructure. This book offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as other advancements. It explores practical solutions to a range of cyber-physical and IT infrastructure protection issues.
Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.
Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It is suitable for beginning hackers.
A complete reference guide to the use of forensic applications available, software that is used by law enforcement agencies and private forensic examiners. It provides explanations of the complete forensic investigation processes using X-Ways Forensics. It takes you from installation to the advanced features of the software.
Provides focused coverage of network and system security technologies. This title explores practical solutions to a range of network and systems security issues. It features comprehensive and updated coverage of the subject area allows the reader to put current technologies to work.
Suitable for anyone in the IT field charged with keeping information secure and systems up and running, this title gives you the planning and risk management techniques for business continuity and disaster recovery (BCDR).
Investigative case management is more than just organizing your case files. This title provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.
Combines physical and digital investigative techniques. This book also combines investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigation.
Provides readers with an overview of the cloud and how to implement cloud computing in their organizations. This book explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud.
A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.
Includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody - from incident response through analysis in the lab.
Includes lessons that allow even beginners to acquire the knowledge they need quickly. This title features: full-color photos make learning as easy as picking a lock; companion website is filled with indispensible lock picking videos; and extensive appendix details tools and toolkits currently available for all your lock picking needs.
Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices.
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).
If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. . Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques.
Offers an understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. This title includes information about these attacks and significant insight from its team of SQL injection experts, who tell you about: understanding SQL Injection, what it is and how it works.
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and more.
Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.
Provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. This book offers many real-world examples of data concealment on the technologies that including iOS, Android, VMware, MacOS X, Linux and Windows 7.
Covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. This book provides a review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, and other low-level functions).
Provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing the traffic running on a computer network. This title offers readers with the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic.
Effectively analyzing large volumes of diverse logs can pose many challenges. This title helps to simplify this complex process using practical guidance and real-world examples. It includes information on different uses for logs - from system operations to regulatory compliance.
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. This title provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them.
Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-spyware, intrusion detection systems.
Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of forensic file system analysis.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.