Penetration testing is often considered an art as much as it is a science, but even an
artist needs the right brushes to do the job well. Many commercial and open source
tools exist for performing penetration testing, but it’s often hard to ensure that you
know what tools are available and which ones to use for a certain task....
Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...
One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems...
The Android mobile platform has quickly risen from its first phone in October 2008
to the most popular mobile operating system in the world by early 2011. The
explosive growth of the platform has been a significant win for consumers with
respect to competition and features. However, forensic analysts and security engineers
have...
Boring, boring, boring. Isn’t this what immediately comes to mind when one
sees books on foundational concepts of information security? Monotonous
coverage of theory, dry details of history, brief yet inadequate coverage of every
topic known to man, even though you know that you’ll never be hired by the
NSA as a...
I suppose there are several questions that may be running through your head
as you contemplate reading this book: Who is the intended audience for this
book? How is this book different from book ‘x’ (insert your favorite title here)?
Why should I buy it? Because these are all fair questions and I am asking you
to plunk...
This book is intended for individuals who are interested in the iPhone and other
iOS devices and, more importantly, in the type of data that is stored and can be
recovered from these devices. The demand for mobile forensics has grown tremendously
with the release of smart phones. Communication on these devices is now
documented...
The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers,...
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...
Information is the most valuable resource in the 21st century. Whether for a
consumer looking for a restaurant in San Francisco, a small business woman checking
textile prices in Bangalore, or a financial services executive in London studying
stock market trends, information at the moment of decision is key in providing the...