Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Provides a technology-based survey of methods and techniques that leaves the reader without an understanding of the interrelationships between methods and techniques. This title offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information.
Serves as a security practitioner's guide to crucial issues in cyber security and IT infrastructure. This book offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as other advancements. It explores practical solutions to a range of cyber-physical and IT infrastructure protection issues.
Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.
Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It is suitable for beginning hackers.
A complete reference guide to the use of forensic applications available, software that is used by law enforcement agencies and private forensic examiners. It provides explanations of the complete forensic investigation processes using X-Ways Forensics. It takes you from installation to the advanced features of the software.
Provides focused coverage of network and system security technologies. This title explores practical solutions to a range of network and systems security issues. It features comprehensive and updated coverage of the subject area allows the reader to put current technologies to work.
Suitable for anyone in the IT field charged with keeping information secure and systems up and running, this title gives you the planning and risk management techniques for business continuity and disaster recovery (BCDR).
Investigative case management is more than just organizing your case files. This title provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.
Combines physical and digital investigative techniques. This book also combines investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigation.
Provides readers with an overview of the cloud and how to implement cloud computing in their organizations. This book explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud.
Includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody - from incident response through analysis in the lab.
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).
Offers an understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. This title includes information about these attacks and significant insight from its team of SQL injection experts, who tell you about: understanding SQL Injection, what it is and how it works.
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and more.
Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.
Provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. This book offers many real-world examples of data concealment on the technologies that including iOS, Android, VMware, MacOS X, Linux and Windows 7.
Covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. This book provides a review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, and other low-level functions).
Provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing the traffic running on a computer network. This title offers readers with the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.