Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...

Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect...

Federated Identity Primer
Federated Identity Primer
The conceptoffederatedidentityisnothingnew.Infact,ithasbeen around alongtime.Itjustneverreallycaughton,partiallybecauseits usage scenarioswerelimited.But,thathaschanged.Nowwiththe increased usageofcloudandInternet-basedapplications,federated identity hasstartedtogainalotoftraction.Instancesoffederated identity...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

CISSP Study Guide, Second Edition
CISSP Study Guide, Second Edition

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common Body of Knowledge. The ten domains are covered completely and as...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Web Application Obfuscation
Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...

Python Forensics: A workbench for inventing and sharing digital forensic technology
Python Forensics: A workbench for inventing and sharing digital forensic technology

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build...

Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks

The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
...

Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference
Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference

Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions; and discusses its deployment.
After introducing Windows Server 2008
...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy