DFIR Training
  • Home
  • Training
  • Blog
  • Resources
  • News
  • About
  • Digital Forensics Complete Self-Assessment Guide Kindle Edition

    by Gerardus Blokdyk (Author) 

    What other jobs or tasks affect the performance of the steps in the Digital Forensics process? Risk factors: what are the characteristics of Digital Forensics that make it risky? What key business process output measure(s) does Digital Forensics leverage and how? How will you measure your Digital Forensics effectiveness? How are the Digital Forensics's objectives aligned to the organization’s overall business strategy?

    • ASIN ‏ : ‎ B07CVTPJW4
    • Publisher ‏ : ‎ 5STARCooks (May 2, 2018)
    • Publication date ‏ : ‎ May 2, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 300 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ 
    51wz9b3d2rl
    51wz9b3d2rl

    Digital Forensics Complete Self-Assessment Guide Kindle Edition

    by Gerardus Blokdyk (Author) 

    What other jobs or tasks affect the performance of the steps in the Digital Forensics process? Risk factors: what are the characteristics of Digital Forensics that make it risky? What key business process output measure(s) does Digital Forensics leverage and how? How will you measure your Digital Forensics effectiveness? How are the Digital Forensics's objectives aligned to the organization’s overall business strategy?

    • ASIN ‏ : ‎ B07CVTPJW4
    • Publisher ‏ : ‎ 5STARCooks (May 2, 2018)
    • Publication date ‏ : ‎ May 2, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 300 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ 
  • Digital Forensics Framework A Complete Guide Kindle Edition

    by Gerardus Blokdyk (Author)  Format: Kindle Edition

    Who is the main stakeholder, with ultimate responsibility for driving Digital Forensics Framework forward? Do we monitor the Digital Forensics Framework decisions made and fine tune them as they evolve? What is the total cost related to deploying Digital Forensics Framework, including any consulting or professional services? How to deal with Digital Forensics Framework Changes? How are the Digital Forensics Framework's objectives aligned to the organization’s overall business strategy?

    • ASIN ‏ : ‎ B07CVSTPVN
    • Publisher ‏ : ‎ 5STARCooks (May 4, 2018)
    • Publication date ‏ : ‎ May 4, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 279 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    419rx1ipiel
    419rx1ipiel

    Digital Forensics Framework A Complete Guide Kindle Edition

    by Gerardus Blokdyk (Author)  Format: Kindle Edition

    Who is the main stakeholder, with ultimate responsibility for driving Digital Forensics Framework forward? Do we monitor the Digital Forensics Framework decisions made and fine tune them as they evolve? What is the total cost related to deploying Digital Forensics Framework, including any consulting or professional services? How to deal with Digital Forensics Framework Changes? How are the Digital Forensics Framework's objectives aligned to the organization’s overall business strategy?

    • ASIN ‏ : ‎ B07CVSTPVN
    • Publisher ‏ : ‎ 5STARCooks (May 4, 2018)
    • Publication date ‏ : ‎ May 4, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 279 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
  • Digital forensic process Standard Requirements Kindle Edition

    by Gerardus Blokdyk (Author)

    Does Digital forensic process systematically track and analyze outcomes for accountability and quality improvement? Does Digital forensic process appropriately measure and monitor risk? What are the success criteria that will indicate that Digital forensic process objectives have been met and the benefits delivered? How to Secure Digital forensic process? What are the long-term Digital forensic process goals?

    • ASIN ‏ : ‎ B07CVSYFD3
    • Publisher ‏ : ‎ 5STARCooks (May 3, 2018)
    • Publication date ‏ : ‎ May 3, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 309 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 95 pages
    51zwdtsltql
    51zwdtsltql

    Digital forensic process Standard Requirements Kindle Edition

    by Gerardus Blokdyk (Author)

    Does Digital forensic process systematically track and analyze outcomes for accountability and quality improvement? Does Digital forensic process appropriately measure and monitor risk? What are the success criteria that will indicate that Digital forensic process objectives have been met and the benefits delivered? How to Secure Digital forensic process? What are the long-term Digital forensic process goals?

    • ASIN ‏ : ‎ B07CVSYFD3
    • Publisher ‏ : ‎ 5STARCooks (May 3, 2018)
    • Publication date ‏ : ‎ May 3, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 309 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 95 pages
  • Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence 1st ed. Edition

    by Nihad A. Hassan (Author), Rami Hijazi (Author)
    4.5 4.5 out of 5 stars    158 ratings
     
    3.7 on Goodreads
     
    31 ratings
    See all formats and editions

    • Kindle
      $13.50 - $34.99
      Read with Our Free App
    •  
    • Paperback
      $37.59 - $43.80 
       
      9 Used from $30.5721 New from $29.34
    Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.
    The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. 
    Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. 

     

    What You’ll Learn

     

     

    • Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization
    • Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside
      • Publisher ‏ : ‎ Apress; 1st ed. edition (July 1, 2018)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 377 pages
      • ISBN-10 ‏ : ‎ 1484232127
      • ISBN-13 ‏ : ‎ 978-1484232125
      • Item Weight ‏ : ‎ 1.45 pounds
      • Dimensions ‏ : ‎ 7.01 x 0.86 x 10 inches
      • Best Sellers Rank: #214,318 in Books (S
      attackers
    41skdgudzwl. sx348 bo1 204 203
    41skdgudzwl. sx348 bo1 204 203

    Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence 1st ed. Edition

    by Nihad A. Hassan (Author), Rami Hijazi (Author)
    4.5 4.5 out of 5 stars    158 ratings
     
    3.7 on Goodreads
     
    31 ratings
    See all formats and editions

    • Kindle
      $13.50 - $34.99
      Read with Our Free App
    •  
    • Paperback
      $37.59 - $43.80 
       
      9 Used from $30.5721 New from $29.34
    Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.
    The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. 
    Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. 

     

    What You’ll Learn

     

     

    • Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization
    • Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside
      • Publisher ‏ : ‎ Apress; 1st ed. edition (July 1, 2018)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 377 pages
      • ISBN-10 ‏ : ‎ 1484232127
      • ISBN-13 ‏ : ‎ 978-1484232125
      • Item Weight ‏ : ‎ 1.45 pounds
      • Dimensions ‏ : ‎ 7.01 x 0.86 x 10 inches
      • Best Sellers Rank: #214,318 in Books (S
      attackers
  • Hacker Methodology Handbook Paperback – November 14, 2018

    by Thomas Bobeck (Author)
    4.6 4.6 out of 5 stars    180 ratings
    See all formats and editions

    • Kindle
      $9.99
      You Earn: 30 pts
      Read with Our Free App
    •  
    • Paperback
      $15.00
      You Earn: 15 pts 
       
      9 Used from $8.139 New from $15.00
    This handbook is the perfect starting place for anyone who wants to jump into the world of penetration testing but doesn't know where to start. This book covers every phase of the hacker methodology and what tools to use in each phase. The tools in this book are all open source or already present on Windows and Linux systems. Covered is the basics usage of the tools, examples, options used with the tools, as well as any notes about possible side effects of using a specific tool.

    oduct details

    • Publisher ‏ : ‎ Independently published (November 14, 2018)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 136 pages
    • ISBN-10 ‏ : ‎ 1731258380
    • ISBN-13 ‏ : ‎ 978-1731258380
    • Item Weight ‏ : ‎ 6.4 ounces
    • Dimensions ‏ : ‎ 5.5 x 0.34 x 8.5 inches
    • Best Sellers Rank: #723,752 in Books (See Top 100 in Books)
      • #494 in Computer Hacking
      • #29,162 in Schools & Teaching (Books)
    • Customer Reviews: 
      4.6 4.6 out of 5 stars  
     
    21prgahveal. sx322 bo1 204 203
    21prgahveal. sx322 bo1 204 203

    Hacker Methodology Handbook Paperback – November 14, 2018

    by Thomas Bobeck (Author)
    4.6 4.6 out of 5 stars    180 ratings
    See all formats and editions

    • Kindle
      $9.99
      You Earn: 30 pts
      Read with Our Free App
    •  
    • Paperback
      $15.00
      You Earn: 15 pts 
       
      9 Used from $8.139 New from $15.00
    This handbook is the perfect starting place for anyone who wants to jump into the world of penetration testing but doesn't know where to start. This book covers every phase of the hacker methodology and what tools to use in each phase. The tools in this book are all open source or already present on Windows and Linux systems. Covered is the basics usage of the tools, examples, options used with the tools, as well as any notes about possible side effects of using a specific tool.

    oduct details

    • Publisher ‏ : ‎ Independently published (November 14, 2018)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 136 pages
    • ISBN-10 ‏ : ‎ 1731258380
    • ISBN-13 ‏ : ‎ 978-1731258380
    • Item Weight ‏ : ‎ 6.4 ounces
    • Dimensions ‏ : ‎ 5.5 x 0.34 x 8.5 inches
    • Best Sellers Rank: #723,752 in Books (See Top 100 in Books)
      • #494 in Computer Hacking
      • #29,162 in Schools & Teaching (Books)
    • Customer Reviews: 
      4.6 4.6 out of 5 stars  
     
  • Social Engineering: The Science of Human Hacking 2nd Edition, Kindle Edition

    by Christopher Hadnagy (Author)  Format: Kindle Edition
    4.6 4.6 out of 5 stars    912 ratings
    Quality issues reported
     
    See all formats and editions

    • Kindle
      $21.00
      Read with Our Free App
    •  
    • Audible Logo Audiobook
      $0.00
      Free with your Audible trial
    •  
    • Paperback
      $20.01 - $20.49 
       
      29 Used from $13.7834 New from $20.49
    •  
    • Audio CD
      $27.29 
       
      1 New from $27.29
     

    Harden the human firewall against the most current threats

    Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.

    Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks.

    • Examine the most common social engineering tricks used to gain access
    • Discover which popular techniques generally don’t work in the real world
    • Examine how our understanding of the science behind emotions and decisions can be used by social engineers
    • Learn how social engineering factors into some of the biggest recent headlines
    • Learn how to use these skills as a professional social engineer and secure your company
    • Adopt effective counter-measures to keep hackers at bay

    By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

    Read less

    1. ISBN-13
       
      978-1119433385
    2. Edition
       
      2nd
    3. Sticky notes
       
      On Kindle Scribe
    4. Publisher
       
      Wiley
    5. Publication date
       
      June 25, 2018
    6. Language
       
      English
    7.  
       
       
    Next page

    Due to its large file size, this book may take longer to download

    Read with the free Kindle apps (available on iOS, Android, PC & Mac), Kindle E-readers and on Fire Tablet devices. See all supported devices 
     

    From the Publisher

    social engineering book, chris hadnagy, social engineering defense, cybersecurity
     
    social engineering book, chris hadnagy, social engineering defense, cybersecurity

    social engineering book, chris hadnagy, social engineering defense, cybersecurity

    social engineering book, chris hadnagy, social engineering defense, cybersecurity

    social engineering book, chris hadnagy, social engineering defense, cybersecurity

     
     
     
    • ASIN ‏ : ‎ B07F24YV2M
    • Publisher ‏ : ‎ Wiley; 2nd edition (June 25, 2018)
    • Publication date ‏ : ‎ June 25, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 16270 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 322 pages
    • Best Sellers Rank: #72,391 in Kindle Store (See Top 100 in Kindle Store)
      • #5 in Online Safety & Piracy
      • #29 in Privacy & Online Safety
     
    5175ykye16l
    5175ykye16l

    Social Engineering: The Science of Human Hacking 2nd Edition, Kindle Edition

    by Christopher Hadnagy (Author)  Format: Kindle Edition
    4.6 4.6 out of 5 stars    912 ratings
    Quality issues reported
     
    See all formats and editions

    • Kindle
      $21.00
      Read with Our Free App
    •  
    • Audible Logo Audiobook
      $0.00
      Free with your Audible trial
    •  
    • Paperback
      $20.01 - $20.49 
       
      29 Used from $13.7834 New from $20.49
    •  
    • Audio CD
      $27.29 
       
      1 New from $27.29
     

    Harden the human firewall against the most current threats

    Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.

    Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks.

    • Examine the most common social engineering tricks used to gain access
    • Discover which popular techniques generally don’t work in the real world
    • Examine how our understanding of the science behind emotions and decisions can be used by social engineers
    • Learn how social engineering factors into some of the biggest recent headlines
    • Learn how to use these skills as a professional social engineer and secure your company
    • Adopt effective counter-measures to keep hackers at bay

    By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

    Read less

    1. ISBN-13
       
      978-1119433385
    2. Edition
       
      2nd
    3. Sticky notes
       
      On Kindle Scribe
    4. Publisher
       
      Wiley
    5. Publication date
       
      June 25, 2018
    6. Language
       
      English
    7.  
       
       
    Next page

    Due to its large file size, this book may take longer to download

    Read with the free Kindle apps (available on iOS, Android, PC & Mac), Kindle E-readers and on Fire Tablet devices. See all supported devices 
     

    From the Publisher

    social engineering book, chris hadnagy, social engineering defense, cybersecurity
     
    social engineering book, chris hadnagy, social engineering defense, cybersecurity

    social engineering book, chris hadnagy, social engineering defense, cybersecurity

    social engineering book, chris hadnagy, social engineering defense, cybersecurity

    social engineering book, chris hadnagy, social engineering defense, cybersecurity

     
     
     
    • ASIN ‏ : ‎ B07F24YV2M
    • Publisher ‏ : ‎ Wiley; 2nd edition (June 25, 2018)
    • Publication date ‏ : ‎ June 25, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 16270 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 322 pages
    • Best Sellers Rank: #72,391 in Kindle Store (See Top 100 in Kindle Store)
      • #5 in Online Safety & Piracy
      • #29 in Privacy & Online Safety
     
  • PoC or GTFO, Volume 2 Hardcover – August 14, 2018

    by Manul Laphroaig (Author)
    4.9 4.9 out of 5 stars    92 ratings
     
    4.5 on Goodreads
     
    31 ratings
    See all formats and editions

    • Kindle
      $14.99
      You Earn: 45 pts
      Read with Our Free App
    •  
    • Hardcover
      $28.33
      You Earn: 29 pts 
       
      11 Used from $24.7117 New from $26.29
    PoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.

    The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen.

    Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under Linux. How to slow the Windows kernel when exploiting a race condition and how to make a PDF file that is also an Android app, an audio file, or a Gameboy speedrun. How to hack a Wacom pen table with voltage glitching, then hack it again by pure software to read RDID tags from its surface. How to disassemble every last byte of an Atari game and how to bypass every classic form of copy protection on Apple ][.

    But above all else, beyond the nifty tricks and silly songs, this book exists to remind you what a clever engineer can build from a box of parts with a bit of free time. Not to show you what others have done, but to show you how they did it so that you can do the same.
    Read less

    roduct details

    • Publisher ‏ : ‎ No Starch Press (August 14, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 788 pages
    • ISBN-10 ‏ : ‎ 1593279345
    • ISBN-13 ‏ : ‎ 978-1593279349
    • Item Weight ‏ : ‎ 2.05 pounds
    • Dimensions ‏ : ‎ 6.19 x 1.39 x 8.56 inches
       Report incorrect produc
    51zjwjfpu0l. sx376 bo1 204 203
    51zjwjfpu0l. sx376 bo1 204 203

    PoC or GTFO, Volume 2 Hardcover – August 14, 2018

    by Manul Laphroaig (Author)
    4.9 4.9 out of 5 stars    92 ratings
     
    4.5 on Goodreads
     
    31 ratings
    See all formats and editions

    • Kindle
      $14.99
      You Earn: 45 pts
      Read with Our Free App
    •  
    • Hardcover
      $28.33
      You Earn: 29 pts 
       
      11 Used from $24.7117 New from $26.29
    PoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.

    The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen.

    Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under Linux. How to slow the Windows kernel when exploiting a race condition and how to make a PDF file that is also an Android app, an audio file, or a Gameboy speedrun. How to hack a Wacom pen table with voltage glitching, then hack it again by pure software to read RDID tags from its surface. How to disassemble every last byte of an Atari game and how to bypass every classic form of copy protection on Apple ][.

    But above all else, beyond the nifty tricks and silly songs, this book exists to remind you what a clever engineer can build from a box of parts with a bit of free time. Not to show you what others have done, but to show you how they did it so that you can do the same.
    Read less

    roduct details

    • Publisher ‏ : ‎ No Starch Press (August 14, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 788 pages
    • ISBN-10 ‏ : ‎ 1593279345
    • ISBN-13 ‏ : ‎ 978-1593279349
    • Item Weight ‏ : ‎ 2.05 pounds
    • Dimensions ‏ : ‎ 6.19 x 1.39 x 8.56 inches
       Report incorrect produc
  • Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents

    by Wilson Bautista Jr. (Author)
    4.3 4.3 out of 5 stars    39 ratings
    See all formats and editions

    • Kindle
      $26.99
      Read with Our Free App
    •  
    • Paperback
      $39.94 - $46.99 
       
      11 Used from $36.9415 New from $46.94
    Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
    Key Features
    • Intelligence processes and procedures for response mechanisms
    • Master F3EAD to drive processes based on intelligence
    • Threat modeling and intelligent frameworks
    • Case studies and how to go about building intelligent teams
    Book DescriptionCyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.
    Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. 
    By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.
    What you will learn
    • Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security
    • Understand tactical view of Active defense concepts and their application in today's threat landscape
    • Get acquainted with an operational view of the F3EAD process to drive decision making within an organization
    • Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization
    • Understand the idea of communicating with the Potential for Exploitability based on cyber intelligence
    Who This Book Is ForThis book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented.
    Table of Contents
    1. The Need for Cyber Intelligence
    2. Intelligence Development
    3. Integrating Cyber Intel, Security, and Operations
    4. Using Cyber Intelligence to Enable Active Defense
    5. F3EAD For You and For Me
    6. Integrating Threat Intelligence and Operations
    7. Creating the Collaboration Capability
    8. The Security Stack
    9. Driving Cyber Intel
    10. Baselines and Anomalies
    11. Putting Out the Fires
    12. Vulnerability Management
    13. Risky Business

      roduct details

      • ASIN ‏ : ‎ 1788625560
      • Publisher ‏ : ‎ Packt Publishing (March 29, 2018)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 322 pages
      • ISBN-10 ‏ : ‎ 9781788625562
      • ISBN-13 ‏ : ‎ 978-1788625562
      • Reading age ‏ : ‎ 1 year and up
      • Item Weight ‏ : ‎ 1.2 pounds
      • Dimensions ‏ : ‎ 7.5 x 0.73 x 9.25 inches
      • Best Sellers Rank: #745,630 in Books (See Top 100 in Bo
    14. Assigning Metrics
    1788625560.01. sclzzzzzzz sx500
    1788625560.01. sclzzzzzzz sx500

    Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents

    by Wilson Bautista Jr. (Author)
    4.3 4.3 out of 5 stars    39 ratings
    See all formats and editions

    • Kindle
      $26.99
      Read with Our Free App
    •  
    • Paperback
      $39.94 - $46.99 
       
      11 Used from $36.9415 New from $46.94
    Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
    Key Features
    • Intelligence processes and procedures for response mechanisms
    • Master F3EAD to drive processes based on intelligence
    • Threat modeling and intelligent frameworks
    • Case studies and how to go about building intelligent teams
    Book DescriptionCyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.
    Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. 
    By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.
    What you will learn
    • Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security
    • Understand tactical view of Active defense concepts and their application in today's threat landscape
    • Get acquainted with an operational view of the F3EAD process to drive decision making within an organization
    • Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization
    • Understand the idea of communicating with the Potential for Exploitability based on cyber intelligence
    Who This Book Is ForThis book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented.
    Table of Contents
    1. The Need for Cyber Intelligence
    2. Intelligence Development
    3. Integrating Cyber Intel, Security, and Operations
    4. Using Cyber Intelligence to Enable Active Defense
    5. F3EAD For You and For Me
    6. Integrating Threat Intelligence and Operations
    7. Creating the Collaboration Capability
    8. The Security Stack
    9. Driving Cyber Intel
    10. Baselines and Anomalies
    11. Putting Out the Fires
    12. Vulnerability Management
    13. Risky Business

      roduct details

      • ASIN ‏ : ‎ 1788625560
      • Publisher ‏ : ‎ Packt Publishing (March 29, 2018)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 322 pages
      • ISBN-10 ‏ : ‎ 9781788625562
      • ISBN-13 ‏ : ‎ 978-1788625562
      • Reading age ‏ : ‎ 1 year and up
      • Item Weight ‏ : ‎ 1.2 pounds
      • Dimensions ‏ : ‎ 7.5 x 0.73 x 9.25 inches
      • Best Sellers Rank: #745,630 in Books (See Top 100 in Bo
    14. Assigning Metrics
  • Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings (Lecture Notes in Computer Science Book 11378) 1st ed. 2019 Edition, Kindle Edition

    by Chang D. Yoo (Editor), Yun-Qing Shi (Editor), & 3 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $21.42 - $52.24
      Read with Our Free App
    •  
    • Paperback
      $36.75 - $54.99 
       
      2 Used from $36.7511 New from $51.59
     
    This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection. 
     
    Read more

    roduct details

    • ASIN ‏ : ‎ B07N8RBBG5
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (January 31, 2019)
    • Publication date ‏ : ‎ January 31, 2019
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 76266 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    41gb4m9i3jl. sy346
    41gb4m9i3jl. sy346

    Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings (Lecture Notes in Computer Science Book 11378) 1st ed. 2019 Edition, Kindle Edition

    by Chang D. Yoo (Editor), Yun-Qing Shi (Editor), & 3 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $21.42 - $52.24
      Read with Our Free App
    •  
    • Paperback
      $36.75 - $54.99 
       
      2 Used from $36.7511 New from $51.59
     
    This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection. 
     
    Read more

    roduct details

    • ASIN ‏ : ‎ B07N8RBBG5
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (January 31, 2019)
    • Publication date ‏ : ‎ January 31, 2019
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 76266 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
  • Legal Tech and Digital Transformation: Competitive Positioning and Business Models of Law Firms Kindle Edition

    by Rupprecht Graf von Pfeil (Author), & 2 more  Format: Kindle Edition
    5.0 5.0 out of 5 stars    2 ratings
    See all formats and editions

    • Kindle
      $80.00
      Read with Our Free App
    •  
    • Paperback
      $75.37 - $90.00 
       
      2 Used from $58.988 New from $58.99
     
    This Special Report on Legal Tech and Digital Transformation offers a practical framework on the following topics:

    • What impact do technology, legal tech and technology-based legal services have on the formulation of strategy in
    traditional law firms?
    • Does legal tech affect the competitive positioning of law firms?
    • Legal tech and client services delivery: will the distinctive value proposition of law firms change?
    • How does legal tech impact the traditional business models of law firms?
    • How do national and international law firms implement technology in their business model? What are best practices and
    what can we learn?

    The report concludes with a commentary on the perspectives law firms should consider in regard to legal tech companies and legal process outsourcing (LPO) providers (and how should they respond). Will we see mergers between law firms and such new entrants and legal tech companies? How will the 'Big 4' embed legal tech in their services and where will they try to compete?
    Read less

    1. ISBN-13
       
      978-1787422087
    2. roduct details

      • ASIN ‏ : ‎ B07KSFHT84
      • Publisher ‏ : ‎ Globe Law and Business (November 1, 2018)
      • Publication date ‏ : ‎ November 1, 2018
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 6973 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Enabled
      • Sticky notes ‏ : ‎ On Kindle Scribe
    41kp2av cll. sy346
    41kp2av cll. sy346

    Legal Tech and Digital Transformation: Competitive Positioning and Business Models of Law Firms Kindle Edition

    by Rupprecht Graf von Pfeil (Author), & 2 more  Format: Kindle Edition
    5.0 5.0 out of 5 stars    2 ratings
    See all formats and editions

    • Kindle
      $80.00
      Read with Our Free App
    •  
    • Paperback
      $75.37 - $90.00 
       
      2 Used from $58.988 New from $58.99
     
    This Special Report on Legal Tech and Digital Transformation offers a practical framework on the following topics:

    • What impact do technology, legal tech and technology-based legal services have on the formulation of strategy in
    traditional law firms?
    • Does legal tech affect the competitive positioning of law firms?
    • Legal tech and client services delivery: will the distinctive value proposition of law firms change?
    • How does legal tech impact the traditional business models of law firms?
    • How do national and international law firms implement technology in their business model? What are best practices and
    what can we learn?

    The report concludes with a commentary on the perspectives law firms should consider in regard to legal tech companies and legal process outsourcing (LPO) providers (and how should they respond). Will we see mergers between law firms and such new entrants and legal tech companies? How will the 'Big 4' embed legal tech in their services and where will they try to compete?
    Read less

    1. ISBN-13
       
      978-1787422087
    2. roduct details

      • ASIN ‏ : ‎ B07KSFHT84
      • Publisher ‏ : ‎ Globe Law and Business (November 1, 2018)
      • Publication date ‏ : ‎ November 1, 2018
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 6973 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Enabled
      • Sticky notes ‏ : ‎ On Kindle Scribe
  • Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers (IFIP Advances ... and Communication Technology Book 532) 1st ed. 2018 Edition, Kindle Edition

    by Gilbert Peterson (Editor), Sujeet Shenoi (Editor)  Format: Kindle Edition
     
    Part of: IFIP Advances in Information and Communication Technology (294 books)
    See all formats and editions

    • Kindle
      $14.22 - $52.24
      Read with Our Free App
    •  
    • Hardcover
      $54.99 
       
      2 Used from $51.557 New from $51.59
     

     

    ADVANCES IN DIGITAL FORENSICS XIV
    Edited by: Gilbert Peterson and Sujeet Shenoi

    Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations.  Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings.  Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in information assurance -  investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.



    Advances in Digital Forensics XIV describes original research results and innovative applications in the discipline of digital forensics.  In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.  The areas of coverage include: Themes and Issues; Forensic Techniques; Network Forensics; Cloud Forensics; and Mobile and Embedded Device Forensics.



    This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics.  The book contains a selection of nineteen edited papers from the Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2018. 



    Advances in Digital Forensics XIV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.



    Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA.



    Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.



     


     

    Product details

    • ASIN ‏ : ‎ B07GYRRH54
    • Publisher ‏ : ‎ Springer; 1st ed. 2018 edition (August 29, 2018)
    • Publication date ‏ : ‎ August 29, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 12806 KB
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    Read more
    4120kmfjsnl. sy346
    4120kmfjsnl. sy346

    Advances in Digital Forensics XIV: 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers (IFIP Advances ... and Communication Technology Book 532) 1st ed. 2018 Edition, Kindle Edition

    by Gilbert Peterson (Editor), Sujeet Shenoi (Editor)  Format: Kindle Edition
     
    Part of: IFIP Advances in Information and Communication Technology (294 books)
    See all formats and editions

    • Kindle
      $14.22 - $52.24
      Read with Our Free App
    •  
    • Hardcover
      $54.99 
       
      2 Used from $51.557 New from $51.59
     

     

    ADVANCES IN DIGITAL FORENSICS XIV
    Edited by: Gilbert Peterson and Sujeet Shenoi

    Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations.  Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings.  Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in information assurance -  investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.



    Advances in Digital Forensics XIV describes original research results and innovative applications in the discipline of digital forensics.  In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.  The areas of coverage include: Themes and Issues; Forensic Techniques; Network Forensics; Cloud Forensics; and Mobile and Embedded Device Forensics.



    This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics.  The book contains a selection of nineteen edited papers from the Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2018. 



    Advances in Digital Forensics XIV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.



    Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA.



    Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.



     


     

    Product details

    • ASIN ‏ : ‎ B07GYRRH54
    • Publisher ‏ : ‎ Springer; 1st ed. 2018 edition (August 29, 2018)
    • Publication date ‏ : ‎ August 29, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 12806 KB
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    Read more
  • nformation and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September ... Notes in Computer Science Book 11398) 1st ed. 2019 Edition, Kindle Edition

    by Apostolos P. Fournaris (Editor), & 2 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $3.82 - $5.24
      Read with Our Free App
    •  
    • Paperback
      $5.52 
       
      6 New from $5.52
     

    This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018.



    The 12 full papers presented were carefully reviewed and selected from 22 submissions. They were organized in topical sections named: Critical Infrastructure Cybersecurity Issues; CyberSecurity Threats, Assessment and Privacy; and Vulnerability and Malware Detection.

    roduct details

    • ASIN ‏ : ‎ B07N81Y1LF
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (January 29, 2019)
    • Publication date ‏ : ‎ January 29, 2019
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 14335 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle 
    Read more
    41 e1gke7ol. sy346
    41 e1gke7ol. sy346

    nformation and Operational Technology Security Systems: First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September ... Notes in Computer Science Book 11398) 1st ed. 2019 Edition, Kindle Edition

    by Apostolos P. Fournaris (Editor), & 2 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $3.82 - $5.24
      Read with Our Free App
    •  
    • Paperback
      $5.52 
       
      6 New from $5.52
     

    This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018.



    The 12 full papers presented were carefully reviewed and selected from 22 submissions. They were organized in topical sections named: Critical Infrastructure Cybersecurity Issues; CyberSecurity Threats, Assessment and Privacy; and Vulnerability and Malware Detection.

    roduct details

    • ASIN ‏ : ‎ B07N81Y1LF
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (January 29, 2019)
    • Publication date ‏ : ‎ January 29, 2019
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 14335 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle 
    Read more
  • Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers (Communications in Computer and Information Science Book 973) 1st ed. 2019 Edition, Kindle Edition

    by Hein Venter (Editor), Marianne Loock (Editor), & 3 more  Format: Kindle Edition
    2.0 2.0 out of 5 stars    1 rating
    See all formats and editions

    • Kindle
      $21.42 - $52.24
      Read with Our Free App
    •  
    • Paperback
      $43.38 - $54.99 
       
      2 Used from $43.389 New from $50.24
     

    This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.



    The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

    Product details

    • ASIN ‏ : ‎ B07N3WTLWN
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (January 24, 2019)
    • Publication date ‏ : ‎ January 24, 2019
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 11517 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    Read morehttps://amzn.to/3OXQZI3
    41ekwzastil. sy346
    41ekwzastil. sy346

    Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers (Communications in Computer and Information Science Book 973) 1st ed. 2019 Edition, Kindle Edition

    by Hein Venter (Editor), Marianne Loock (Editor), & 3 more  Format: Kindle Edition
    2.0 2.0 out of 5 stars    1 rating
    See all formats and editions

    • Kindle
      $21.42 - $52.24
      Read with Our Free App
    •  
    • Paperback
      $43.38 - $54.99 
       
      2 Used from $43.389 New from $50.24
     

    This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.



    The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

    Product details

    • ASIN ‏ : ‎ B07N3WTLWN
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (January 24, 2019)
    • Publication date ‏ : ‎ January 24, 2019
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 11517 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    Read morehttps://amzn.to/3OXQZI3
  • Social Network Forensics, Cyber Security, and Machine Learning (SpringerBriefs in Applied Sciences and Technology) 1st ed. 2019 Edition, Kindle Edition

    by P. Venkata Krishna (Author), & 2 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $25.34 - $64.99
      Read with Our Free App
    •  
    • Paperback
      $36.66 - $58.75 
       
      3 Used from $58.7518 New from $36.66
     

    This book discusses the issues and challenges in Online Social Networks (OSNs). It highlights various aspects of OSNs consisting of novel social network strategies and the development of services using different computing models. Moreover, the book investigates how OSNs are impacted by cutting-edge innovations.

    • ASIN ‏ : ‎ B07MHBWFNQ
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (December 29, 2018)
    • Publication date ‏ : ‎ December 29, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 22082 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    41ydd4ghxnl
    41ydd4ghxnl

    Social Network Forensics, Cyber Security, and Machine Learning (SpringerBriefs in Applied Sciences and Technology) 1st ed. 2019 Edition, Kindle Edition

    by P. Venkata Krishna (Author), & 2 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $25.34 - $64.99
      Read with Our Free App
    •  
    • Paperback
      $36.66 - $58.75 
       
      3 Used from $58.7518 New from $36.66
     

    This book discusses the issues and challenges in Online Social Networks (OSNs). It highlights various aspects of OSNs consisting of novel social network strategies and the development of services using different computing models. Moreover, the book investigates how OSNs are impacted by cutting-edge innovations.

    • ASIN ‏ : ‎ B07MHBWFNQ
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (December 29, 2018)
    • Publication date ‏ : ‎ December 29, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 22082 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
  • Digital Forensics and Investigation: From Data to Digital Evidence

    by Anne Wade (Author)
    See all formats and editions

    • Hardcover
      $191.13 
       
      1 Used from $155.822 New from $173.78
     

    Purchase options and add-ons


    Payment plans
    $18.64/mo (12 mo) at example APR of 30% (rates from 10-30% APR)
    •  
    •  
       
       
      •  
      •  
      Image of this is an image

    Digital Forensics and Investigation: From Data to Digital Evidence examines various aspects of digital forensics and investigation including an extensive overview from data to digital evidence. It includes definitions of digital forensics, models, technologies and strategies. Provides the reader with insights into the development of digital forensics and investigations from data to digital evidence so as to understand the criminal’s mind, motivations, arguments, backgrounds and why some devices are better targets of cybercriminals.

    oduct details

    • Publisher ‏ : ‎ Society Publishing (December 1, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 286 pages
    • ISBN-10 ‏ : ‎ 1773613510
    • ISBN-13 ‏ : ‎ 978-1773613512
    • Item Weight ‏ : ‎ 1.35 pounds
    • Dimensions ‏ : ‎ 6.3 x 0.9 x 9.1 inc
    51ruryat jl. sy291 bo1 204 203 ql40 fmwebp
    51ruryat jl. sy291 bo1 204 203 ql40 fmwebp

    Digital Forensics and Investigation: From Data to Digital Evidence

    by Anne Wade (Author)
    See all formats and editions

    • Hardcover
      $191.13 
       
      1 Used from $155.822 New from $173.78
     

    Purchase options and add-ons


    Payment plans
    $18.64/mo (12 mo) at example APR of 30% (rates from 10-30% APR)
    •  
    •  
       
       
      •  
      •  
      Image of this is an image

    Digital Forensics and Investigation: From Data to Digital Evidence examines various aspects of digital forensics and investigation including an extensive overview from data to digital evidence. It includes definitions of digital forensics, models, technologies and strategies. Provides the reader with insights into the development of digital forensics and investigations from data to digital evidence so as to understand the criminal’s mind, motivations, arguments, backgrounds and why some devices are better targets of cybercriminals.

    oduct details

    • Publisher ‏ : ‎ Society Publishing (December 1, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 286 pages
    • ISBN-10 ‏ : ‎ 1773613510
    • ISBN-13 ‏ : ‎ 978-1773613512
    • Item Weight ‏ : ‎ 1.35 pounds
    • Dimensions ‏ : ‎ 6.3 x 0.9 x 9.1 inc
  • Introductory Computer Forensics: A Hands-on Practical Approach 1st ed. 2018 Edition, Kindle Edition

    by Xiaodong Lin (Author)  Format: Kindle Edition
    5.0 5.0 out of 5 stars    1 rating
    See all formats and editions

    • eTextbook
      $64.50 - $109.00
      Read with Our Free App
    •  
    • Hardcover
      $58.31 - $96.16 
       
      3 Used from $58.319 New from $96.16
     

    This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge.

     This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques.

     This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

       

     

     

    Read less

    Product details

    • ASIN ‏ : ‎ B07KFYM2JS
    • Publisher ‏ : ‎ Springer; 1st ed. 2018 edition (November 10, 2018)
    • Publication date ‏ : ‎ November 10, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 149316 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe

    1.  
    41pdf78h4 l. sy346
    41pdf78h4 l. sy346

    Introductory Computer Forensics: A Hands-on Practical Approach 1st ed. 2018 Edition, Kindle Edition

    by Xiaodong Lin (Author)  Format: Kindle Edition
    5.0 5.0 out of 5 stars    1 rating
    See all formats and editions

    • eTextbook
      $64.50 - $109.00
      Read with Our Free App
    •  
    • Hardcover
      $58.31 - $96.16 
       
      3 Used from $58.319 New from $96.16
     

    This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge.

     This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques.

     This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

       

     

     

    Read less

    Product details

    • ASIN ‏ : ‎ B07KFYM2JS
    • Publisher ‏ : ‎ Springer; 1st ed. 2018 edition (November 10, 2018)
    • Publication date ‏ : ‎ November 10, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 149316 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe

    1.  
  • Mobile Network Forensics: Emerging Research and Opportunities (Advances in Digital Crime, Forensics, and Cyber Terrorism) 1st Edition

    by Filipo Sharevski (Author, Editor)
    See all formats and editions

    • Hardcover
      $166.50 - $185.00 
       
      1 Used from $166.508 New from $179.00
    •  
    • Paperback
      $140.00 
       
      1 Used from $66.677 New from $66.70

    Modern communications are now more than ever heavily dependent on mobile networks, creating the potential for higher incidents of sophisticated crimes, terrorism acts, and high impact cyber security breaches. Disrupting these unlawful actions requires a number of digital forensic principles and a comprehensive investigation process.

    Mobile Network Forensics: Emerging Research and Opportunities is an essential reference source that discusses investigative trends in mobile devices and the internet of things, examining malicious mobile network traffic and traffic irregularities, as well as software-defined mobile network backbones. Featuring research on topics such as lawful interception, system architecture, and networking environments, this book is ideally designed for forensic practitioners, government officials, IT consultants, cybersecurity analysts, researchers, professionals, academicians, and students seeking coverage on the technical and legal aspects of conducting investigations in the mobile networking environment.

    roduct details

    • Publisher ‏ : ‎ IGI Global; 1st edition (November 16, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 337 pages
    • ISBN-10 ‏ : ‎ 1522558551
    • ISBN-13 ‏ : ‎ 978-1522558552
    • Item Weight ‏ : ‎ 1.88 pounds
    1522558551.01. sclzzzzzzz sx500
    1522558551.01. sclzzzzzzz sx500

    Mobile Network Forensics: Emerging Research and Opportunities (Advances in Digital Crime, Forensics, and Cyber Terrorism) 1st Edition

    by Filipo Sharevski (Author, Editor)
    See all formats and editions

    • Hardcover
      $166.50 - $185.00 
       
      1 Used from $166.508 New from $179.00
    •  
    • Paperback
      $140.00 
       
      1 Used from $66.677 New from $66.70

    Modern communications are now more than ever heavily dependent on mobile networks, creating the potential for higher incidents of sophisticated crimes, terrorism acts, and high impact cyber security breaches. Disrupting these unlawful actions requires a number of digital forensic principles and a comprehensive investigation process.

    Mobile Network Forensics: Emerging Research and Opportunities is an essential reference source that discusses investigative trends in mobile devices and the internet of things, examining malicious mobile network traffic and traffic irregularities, as well as software-defined mobile network backbones. Featuring research on topics such as lawful interception, system architecture, and networking environments, this book is ideally designed for forensic practitioners, government officials, IT consultants, cybersecurity analysts, researchers, professionals, academicians, and students seeking coverage on the technical and legal aspects of conducting investigations in the mobile networking environment.

    roduct details

    • Publisher ‏ : ‎ IGI Global; 1st edition (November 16, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 337 pages
    • ISBN-10 ‏ : ‎ 1522558551
    • ISBN-13 ‏ : ‎ 978-1522558552
    • Item Weight ‏ : ‎ 1.88 pounds
  • Human-Computer Interaction and Cybersecurity Handbook (Human Factors and Ergonomics) 1st Edition, Kindle Edition

    by Abbas Moallem (Editor)  Format: Kindle Edition
    5.0 5.0 out of 5 stars    1 rating
    Part of: Human Factors and Ergonomics (40 books)
    See all formats and editions

    • Kindle
      $19.22 - $48.99
      Read with Our Free App
    •  
    • Hardcover
      $177.00 - $199.99 
       
      5 Used from $45.0015 New from $139.92
     

    Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019


    Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018


    Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cybersecurity focus on, both from a human–computer interaction point of view, and that of human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices, and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.


    Features



     

    • Covers all areas of human–computer interaction and human factors in cybersecurity

    • Includes information for IT specialists, who often desire more knowledge about the human side of cybersecurity

    • Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management

    • Offers a source of information for cybersecurity practitioners in government agencies and private enterprises

    • Presents new areas such as smart networking and devices

      Product details

      • ASIN ‏ : ‎ B07HZ6P3CY
      • Publisher ‏ : ‎ CRC Press; 1st edition (October 3, 2018)
      • Publication date ‏ : ‎ October 3, 2018
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 2921 KB
      • Simultaneous device usage ‏ : ‎ Up to 4 simultaneous devices, per publisher limits
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
     
    51nbqc4 ptl
    51nbqc4 ptl

    Human-Computer Interaction and Cybersecurity Handbook (Human Factors and Ergonomics) 1st Edition, Kindle Edition

    by Abbas Moallem (Editor)  Format: Kindle Edition
    5.0 5.0 out of 5 stars    1 rating
    Part of: Human Factors and Ergonomics (40 books)
    See all formats and editions

    • Kindle
      $19.22 - $48.99
      Read with Our Free App
    •  
    • Hardcover
      $177.00 - $199.99 
       
      5 Used from $45.0015 New from $139.92
     

    Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019


    Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018


    Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cybersecurity focus on, both from a human–computer interaction point of view, and that of human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices, and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.


    Features



     

    • Covers all areas of human–computer interaction and human factors in cybersecurity

    • Includes information for IT specialists, who often desire more knowledge about the human side of cybersecurity

    • Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management

    • Offers a source of information for cybersecurity practitioners in government agencies and private enterprises

    • Presents new areas such as smart networking and devices

      Product details

      • ASIN ‏ : ‎ B07HZ6P3CY
      • Publisher ‏ : ‎ CRC Press; 1st edition (October 3, 2018)
      • Publication date ‏ : ‎ October 3, 2018
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 2921 KB
      • Simultaneous device usage ‏ : ‎ Up to 4 simultaneous devices, per publisher limits
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
     
  • Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018, Kolkata, India (Advances in Intelligent Systems and Computing Book 811) 1st ed. 2019 Edition, Kindle Edition

    by Mohuya Chakraborty (Editor), & 3 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $61.98 - $159.00
      Read with Our Free App
    •  
    • Paperback
      $169.99 
       
      1 Used from $157.819 New from $158.61
     

    This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

    Product details

    • ASIN ‏ : ‎ B07J29QLS1
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (October 4, 2018)
    • Publication date ‏ : ‎ October 4, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 36324 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    41tvrp30g9l
    41tvrp30g9l

    Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018, Kolkata, India (Advances in Intelligent Systems and Computing Book 811) 1st ed. 2019 Edition, Kindle Edition

    by Mohuya Chakraborty (Editor), & 3 more  Format: Kindle Edition
     
    See all formats and editions

    • Kindle
      $61.98 - $159.00
      Read with Our Free App
    •  
    • Paperback
      $169.99 
       
      1 Used from $157.819 New from $158.61
     

    This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

    Product details

    • ASIN ‏ : ‎ B07J29QLS1
    • Publisher ‏ : ‎ Springer; 1st ed. 2019 edition (October 4, 2018)
    • Publication date ‏ : ‎ October 4, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 36324 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
  • Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Advances in Information Security, Privacy, and Ethics) 1st Edition

    by D.B.A. Mehdi Khosrow-Pour (Author, Editor)
    See all formats and editions

    • Hardcover
      $225.95 - $285.00 
       
      1 Used from $225.955 New from $278.00

    Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches.

    Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

    Read less
       Report inc
    • ublisher ‏ : ‎ IGI Global; 1st edition (October 5, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 417 pages
    • ISBN-10 ‏ : ‎ 1522574921
    • ISBN-13 ‏ : ‎ 978-1522574927
    • Item Weight ‏ : ‎ 1.82 pounds
    • Dimensions ‏ : ‎ 8.5 x 1 x 11 inches
    • Best Sellers Rank: #9,794,613 in Books (See 
    1522574921.01. sclzzzzzzz sx500
    1522574921.01. sclzzzzzzz sx500

    Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Advances in Information Security, Privacy, and Ethics) 1st Edition

    by D.B.A. Mehdi Khosrow-Pour (Author, Editor)
    See all formats and editions

    • Hardcover
      $225.95 - $285.00 
       
      1 Used from $225.955 New from $278.00

    Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches.

    Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

    Read less
       Report inc
    • ublisher ‏ : ‎ IGI Global; 1st edition (October 5, 2018)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 417 pages
    • ISBN-10 ‏ : ‎ 1522574921
    • ISBN-13 ‏ : ‎ 978-1522574927
    • Item Weight ‏ : ‎ 1.82 pounds
    • Dimensions ‏ : ‎ 8.5 x 1 x 11 inches
    • Best Sellers Rank: #9,794,613 in Books (See 
  • Ultimate DFIR Cheats! X-Ways Forensics Paperback – October 10, 2018

    by Brett Shavers (Author)
    5.0 5.0 out of 5 stars    7 ratings
    See all formats and editions

    • Paperback
      — 
       
     
    Written for users of X-Ways Forensics, the Ultimate DFIR Cheats! X-Ways Forensics gives dozens of tips, tricks, cheats, and methods of maximizing X-Ways Forensics to process at the fastest speed possible, be as customized as the user desires, and full of itemized details of the infamous 3-state check boxes and speed settings to process evidence.
       Report incorrect product information.

    1. Print length
       
      118 pages
    2. Language
       
      English
    3.  
       
       
    4.  
       
       
    5.  
       
       
    6.  
       
       
    Next page

    The Amazon Book Review
    The Amazon Book Review
    Book recommendations, author interviews, editors' picks, and more. Read it now
     

     

     

    Product details

    • Publisher ‏ : ‎ CreateSpace Independent Publishing Platform (October 10, 2018)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 118 pages
    • ISBN-10 ‏ : ‎ 1727835859
    • ISBN-13 ‏ : ‎ 978-1727835854
    • Item Weight ‏ : ‎ 10.2 ounces
    • Dimensions ‏ : ‎ 7 x 0.28 x 10 inches
    • Best Sellers Rank: #3,508,124 in Books (See Top 100 in Books)
      • #8,183 in Computer Security & Encryption (Books)
    41l5ngf8ocl. sx348 bo1 204 203
    41l5ngf8ocl. sx348 bo1 204 203

    Ultimate DFIR Cheats! X-Ways Forensics Paperback – October 10, 2018

    by Brett Shavers (Author)
    5.0 5.0 out of 5 stars    7 ratings
    See all formats and editions

    • Paperback
      — 
       
     
    Written for users of X-Ways Forensics, the Ultimate DFIR Cheats! X-Ways Forensics gives dozens of tips, tricks, cheats, and methods of maximizing X-Ways Forensics to process at the fastest speed possible, be as customized as the user desires, and full of itemized details of the infamous 3-state check boxes and speed settings to process evidence.
       Report incorrect product information.

    1. Print length
       
      118 pages
    2. Language
       
      English
    3.  
       
       
    4.  
       
       
    5.  
       
       
    6.  
       
       
    Next page

    The Amazon Book Review
    The Amazon Book Review
    Book recommendations, author interviews, editors' picks, and more. Read it now
     

     

     

    Product details

    • Publisher ‏ : ‎ CreateSpace Independent Publishing Platform (October 10, 2018)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 118 pages
    • ISBN-10 ‏ : ‎ 1727835859
    • ISBN-13 ‏ : ‎ 978-1727835854
    • Item Weight ‏ : ‎ 10.2 ounces
    • Dimensions ‏ : ‎ 7 x 0.28 x 10 inches
    • Best Sellers Rank: #3,508,124 in Books (See Top 100 in Books)
      • #8,183 in Computer Security & Encryption (Books)
  • Investigating Windows Systems 1st Edition

    by Harlan Carvey (Author)
    4.1 4.1 out of 5 stars    32 ratings
    See all formats and editions

    • Kindle
      $51.49
      Read with Our Free App
    •  
    • Paperback
      $40.89 - $54.20 
       
      8 Used from $36.3810 New from $45.99

    Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way.

    Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way.

    A must-have guide for those in the field of digital forensic analysis and incident response.

    Product details

    • Publisher ‏ : ‎ Academic Press; 1st edition (August 30, 2018)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 136 pages
    • ISBN-10 ‏ : ‎ 0128114150
    • ISBN-13 ‏ : ‎ 978-0128114155
    • Item Weight ‏ : ‎ 8.1 ounces
    • Dimensions ‏ : ‎ 5.98 x 0.31 x 9.02 inches
    • Best Sellers Rank: #1,338,242 in Books (See Top 100 in Books)
      • #144 in Windows 10 Guides
      • #596 in Forensic Science Law
      • #3,663 in Law (Books)
    • Customer Reviews: 
      4.1 4.1 out of 5 stars    32 ratin
     
    0128114150.01. sclzzzzzzz sx500
    0128114150.01. sclzzzzzzz sx500

    Investigating Windows Systems 1st Edition

    by Harlan Carvey (Author)
    4.1 4.1 out of 5 stars    32 ratings
    See all formats and editions

    • Kindle
      $51.49
      Read with Our Free App
    •  
    • Paperback
      $40.89 - $54.20 
       
      8 Used from $36.3810 New from $45.99

    Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way.

    Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way.

    A must-have guide for those in the field of digital forensic analysis and incident response.

    Product details

    • Publisher ‏ : ‎ Academic Press; 1st edition (August 30, 2018)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 136 pages
    • ISBN-10 ‏ : ‎ 0128114150
    • ISBN-13 ‏ : ‎ 978-0128114155
    • Item Weight ‏ : ‎ 8.1 ounces
    • Dimensions ‏ : ‎ 5.98 x 0.31 x 9.02 inches
    • Best Sellers Rank: #1,338,242 in Books (See Top 100 in Books)
      • #144 in Windows 10 Guides
      • #596 in Forensic Science Law
      • #3,663 in Law (Books)
    • Customer Reviews: 
      4.1 4.1 out of 5 stars    32 ratin
     
  • Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications 1st ed. 2018 Edition, Kindle Edition

    by Joakim Kävrestad (Author)  Format: Kindle Edition
     
    See all formats and editions

    • eTextbook
      $17.53 - $44.99
      Read with Our Free App
    •  
    • Paperback
      $114.06 
       
      1 New from $114.06
     

    This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can’t. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries.

    Topics and features: introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment; discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes; offers a practical overview of common practices for cracking encrypted data; reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them; presents a survey of various different search techniques, and several forensic tools that are available for free; examines the functions of AccessData Forensic Toolkit and Registry Viewer; proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled; describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility; provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube.

    This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector.

     
    Read more

    1. ISBN-13
       
      978-3319963181
    2. Edition
       
      1st ed. 2018
    3.  
       
       
    4.  
       
       
    5.  
       
       
    6.  
       
       
    7.  
       
       
    Next page

    Due to its large file size, this book may take longer to download

    Read with the free Kindle apps (available on iOS, Android, PC & Mac), Kindle E-readers and on Fire Tablet devices. See all supported devices 
     
     

    Editorial Reviews

    From the Back Cover

    This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can’t. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries.

    Topics and features:

     

    • Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment
    • Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes
    • Offers a practical overview of common practices for cracking encrypted data
    • Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them
    • Presents a survey of various different search tech

      Product details

      • ASIN ‏ : ‎ B07G2XZN8M
      • Publisher ‏ : ‎ Springer; 1st ed. 2018 edition (July 31, 2018)
      • Publication date ‏ : ‎ July 31, 2018
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 14138 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Enabled
      • Sticky notes ‏ : ‎ On Kindle Scribe
    41yed5 sy2l. sy346
    41yed5 sy2l. sy346

    Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications 1st ed. 2018 Edition, Kindle Edition

    by Joakim Kävrestad (Author)  Format: Kindle Edition
     
    See all formats and editions

    • eTextbook
      $17.53 - $44.99
      Read with Our Free App
    •  
    • Paperback
      $114.06 
       
      1 New from $114.06
     

    This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can’t. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries.

    Topics and features: introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment; discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes; offers a practical overview of common practices for cracking encrypted data; reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them; presents a survey of various different search techniques, and several forensic tools that are available for free; examines the functions of AccessData Forensic Toolkit and Registry Viewer; proposes methods for analyzing applications, timelining, determining the identity of the computer user, and deducing if the computer was remote controlled; describes the central concepts relating to computer memory management, and how to perform different types of memory analysis using the open source tool Volatility; provides review questions and practice tasks at the end of most chapters, and supporting video lectures on YouTube.

    This easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations in law enforcement or in the private sector.

     
    Read more

    1. ISBN-13
       
      978-3319963181
    2. Edition
       
      1st ed. 2018
    3.  
       
       
    4.  
       
       
    5.  
       
       
    6.  
       
       
    7.  
       
       
    Next page

    Due to its large file size, this book may take longer to download

    Read with the free Kindle apps (available on iOS, Android, PC & Mac), Kindle E-readers and on Fire Tablet devices. See all supported devices 
     
     

    Editorial Reviews

    From the Back Cover

    This hands-on textbook provides an accessible introduction to the fundamentals of digital forensics. The text contains thorough coverage of the theoretical foundations, explaining what computer forensics is, what it can do, and also what it can’t. A particular focus is presented on establishing sound forensic thinking and methodology, supported by practical guidance on performing typical tasks and using common forensic tools. Emphasis is also placed on universal principles, as opposed to content unique to specific legislation in individual countries.

    Topics and features:

     

    • Introduces the fundamental concepts in digital forensics, and the steps involved in a forensic examination in a digital environment
    • Discusses the nature of what cybercrime is, and how digital evidence can be of use during criminal investigations into such crimes
    • Offers a practical overview of common practices for cracking encrypted data
    • Reviews key artifacts that have proven to be important in several cases, highlighting where to find these and how to correctly interpret them
    • Presents a survey of various different search tech

      Product details

      • ASIN ‏ : ‎ B07G2XZN8M
      • Publisher ‏ : ‎ Springer; 1st ed. 2018 edition (July 31, 2018)
      • Publication date ‏ : ‎ July 31, 2018
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 14138 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Enabled
      • Sticky notes ‏ : ‎ On Kindle Scribe
  • Hands-on Incident Response and Digital Forensics Kindle Edition

    by Mike Sheward (Author)  Format: Kindle Edition
    4.7 4.7 out of 5 stars    20 ratings
    See all formats and editions

    • Kindle
      $35.09
      Read with Our Free App
    •  
    • Paperback
      $36.99 - $38.99 
       
      10 Used from $20.95