Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...
The intention of this book is to provide a thorough reference for those considering a migration
into the virtualized world. The majority of our target readers will likely be seasoned system
administrators and engineers who grew up in and still manage primarily a hardware-based
server environment containing a large assortment of both...
I suppose there are several questions that may be running through your head
as you contemplate reading this book: Who is the intended audience for this
book? How is this book different from book ‘x’ (insert your favorite title here)?
Why should I buy it? Because these are all fair questions and I am asking you
to plunk...
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
This book will prove to be a practical resource for anyone who is considering
using, building, or securing a cloud implementation. Security professionals may
refer to this book as a source of detailed information for evaluating and verifying
cloud security policy and requirements. Cloud infrastructure engineers, cloud services...
A company’s most important asset next to its people is its
information.
This information includes intellectual property,
company
financial information, confidential employee information,
customer information, and so much more. Company
information
may be stored in databases, spreadsheets, flat files,
and so on. Loss of...
We live in a world in which we can’t trust our computers. For example, how can we
know for sure that our hardware manufacturer did not hide malicious code in the
system’s microchip? Or that our freshly installed operating system does not contain
backdoors created by a rogue developer from the OS development team?
Desktop virtualization is a very broad topic, which can encompass various virtualization technologies.
This book is aimed at specifically addressing how to implement a virtual desktop infrastructure (VDI)
solution using Citrix XenDesktop.
This book is not meant as a definitive guide to any one of the technologies...
This book is intended for individuals who are interested in the iPhone and other
iOS devices and, more importantly, in the type of data that is stored and can be
recovered from these devices. The demand for mobile forensics has grown tremendously
with the release of smart phones. Communication on these devices is now
documented...
The Android mobile platform has quickly risen from its first phone in October 2008
to the most popular mobile operating system in the world by early 2011. The
explosive growth of the platform has been a significant win for consumers with
respect to competition and features. However, forensic analysts and security engineers
have...
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...