DFIR Training
  • Home
  • Tools
  • Blog
  • Resources
  • News
  • About
  • Members
  • CYBERSECURITY: PLUS USE OF AI, DS, ML AND ANALYTICS Paperback – June 4, 2023

    by John Mpungu (Author), Benjamin Mpungu (Editor)
    See all formats and editions

    • Paperback
      $20.00
      You Earn: 20 pts 
       
      1 New from $20.00
    Ebook 3 is about cybersecurity threats, how these threats impact business operations, and ways to stop or reduce their impact. Millions of dollars are lost every year investing in cybersecurity threat prevention and/or responding to breaches. The Ebook also looks into how AI, DS, ML, and Analytics are used in cybersecurity threat prevention and breach incident response. This Ebook is handy for those interested in pursuing a course in cybersecurity or those who simply want to have a basic understanding only to be aware. The author can provide coaching if needed. It will be advisable to also read Ebooks 1 and 2 to comprehend better. The experience and expertise of the authors are contained in the Ebook introduction.
    Read less
       Report incorrect product information.
    • ASIN ‏ : ‎ B0C6VZ2384
    • Publisher ‏ : ‎ Independently published (June 4, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 100 pages
    • ISBN-13 ‏ : ‎ 979-8397144186
    • Item Weight ‏ : ‎ 11.2 ounces
    • Dimensions ‏ : ‎ 8.5 x 0.23 x 11 inches
    •  
     
     

    Videos


    1. P
    b0c6vz2384.01. sclzzzzzzz sx500
    b0c6vz2384.01. sclzzzzzzz sx500

    CYBERSECURITY: PLUS USE OF AI, DS, ML AND ANALYTICS Paperback – June 4, 2023

    by John Mpungu (Author), Benjamin Mpungu (Editor)
    See all formats and editions

    • Paperback
      $20.00
      You Earn: 20 pts 
       
      1 New from $20.00
    Ebook 3 is about cybersecurity threats, how these threats impact business operations, and ways to stop or reduce their impact. Millions of dollars are lost every year investing in cybersecurity threat prevention and/or responding to breaches. The Ebook also looks into how AI, DS, ML, and Analytics are used in cybersecurity threat prevention and breach incident response. This Ebook is handy for those interested in pursuing a course in cybersecurity or those who simply want to have a basic understanding only to be aware. The author can provide coaching if needed. It will be advisable to also read Ebooks 1 and 2 to comprehend better. The experience and expertise of the authors are contained in the Ebook introduction.
    Read less
       Report incorrect product information.
    • ASIN ‏ : ‎ B0C6VZ2384
    • Publisher ‏ : ‎ Independently published (June 4, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 100 pages
    • ISBN-13 ‏ : ‎ 979-8397144186
    • Item Weight ‏ : ‎ 11.2 ounces
    • Dimensions ‏ : ‎ 8.5 x 0.23 x 11 inches
    •  
     
     

    Videos


    1. P
  • Cybersecurity for Beginners 2023: From Beginner to Expert | Learn how to Defend Yourself and Companies from Online Attacks in 7 minutes a day with the Methods of a True Professional Paperback – May 5, 2023

    by Timothy Simmons (Author)
    5.0 5.0 out of 5 stars    671 ratings
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$9.99 to buyYou Earn: 60 pts
    •  
    • Paperback
      $19.97
      You Earn: 20 pts 
       
      1 New from $19.97

    BREAKING NEWS: CYBERSECURITY EXPERT WHO THWARTED MORE THAN 1,000 ATTACKS FINALLY PUBLISHES A GUIDE WITH ALL THE SECRETS TO FENDING OFF EVEN THE MOST POWERFUL HACKER ATTACKS

     

    Are you interested in the world of cybersecurity? Do you want to learn how to protect yourself and companies from online attacks using the methods of a true professional?

     

     If the answer is yes, then you are in the right place at the right time!

     

    In today's digital age, cybersecurity is one of the most critical fields, with the demand for skilled professionals rapidly increasing.

     

    Learning the skills to fend off a hacker attack on your own can be very time-consuming, which is exactly why I have made “Cybersecurity for Beginners”, to take you from zero to expert hacker!

     

    Inside this book, you'll discover:

     

    • The basics of cybersecurity and hacking with a complete list of terms you absolutely must know to start this career;
    • 9 serious mistakes that encourage hackers to enter your pc that you're probably making and could put you at risk;
    • An expert’s advices to turn your cybersecurity skills into a lucrative career that will give you financial independence;
    • The 7 most important techniques used by cybersecurity professionals to protect against online threats;
    • How to defend against different types of attacks, including malware, phishing, and social engineering;
    • AND MUCH, MUCH MORE!

     

    Whether you're a complete beginner or have some knowledge of cybersecurity, this book will provide you with a step-by-step blueprint to become an expert ethical hacker, thanks to practical exercises and real-world examples.

     

    Don't wait any longer!

     

    Click "Buy Now" and become an experienced and in-demand professional who can protect against the growing threat of online attacks!

    roduct details

    • ASIN ‏ : ‎ B0C47PN3ZG
    • Publisher ‏ : ‎ Independently published (May 5, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 100 pages
    • ISBN-13 ‏ : ‎ 979-8393659882
    • Item Weight ‏ : ‎ 9.9 ounces
    • Dimensions ‏ : ‎ 8 x 0.23 x 10 inches
    • Best Sellers Rank: #150,260 in Books (See Top 100 i
    b0c47pn3zg.01. sclzzzzzzz sx500
    b0c47pn3zg.01. sclzzzzzzz sx500

    Cybersecurity for Beginners 2023: From Beginner to Expert | Learn how to Defend Yourself and Companies from Online Attacks in 7 minutes a day with the Methods of a True Professional Paperback – May 5, 2023

    by Timothy Simmons (Author)
    5.0 5.0 out of 5 stars    671 ratings
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$9.99 to buyYou Earn: 60 pts
    •  
    • Paperback
      $19.97
      You Earn: 20 pts 
       
      1 New from $19.97

    BREAKING NEWS: CYBERSECURITY EXPERT WHO THWARTED MORE THAN 1,000 ATTACKS FINALLY PUBLISHES A GUIDE WITH ALL THE SECRETS TO FENDING OFF EVEN THE MOST POWERFUL HACKER ATTACKS

     

    Are you interested in the world of cybersecurity? Do you want to learn how to protect yourself and companies from online attacks using the methods of a true professional?

     

     If the answer is yes, then you are in the right place at the right time!

     

    In today's digital age, cybersecurity is one of the most critical fields, with the demand for skilled professionals rapidly increasing.

     

    Learning the skills to fend off a hacker attack on your own can be very time-consuming, which is exactly why I have made “Cybersecurity for Beginners”, to take you from zero to expert hacker!

     

    Inside this book, you'll discover:

     

    • The basics of cybersecurity and hacking with a complete list of terms you absolutely must know to start this career;
    • 9 serious mistakes that encourage hackers to enter your pc that you're probably making and could put you at risk;
    • An expert’s advices to turn your cybersecurity skills into a lucrative career that will give you financial independence;
    • The 7 most important techniques used by cybersecurity professionals to protect against online threats;
    • How to defend against different types of attacks, including malware, phishing, and social engineering;
    • AND MUCH, MUCH MORE!

     

    Whether you're a complete beginner or have some knowledge of cybersecurity, this book will provide you with a step-by-step blueprint to become an expert ethical hacker, thanks to practical exercises and real-world examples.

     

    Don't wait any longer!

     

    Click "Buy Now" and become an experienced and in-demand professional who can protect against the growing threat of online attacks!

    roduct details

    • ASIN ‏ : ‎ B0C47PN3ZG
    • Publisher ‏ : ‎ Independently published (May 5, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 100 pages
    • ISBN-13 ‏ : ‎ 979-8393659882
    • Item Weight ‏ : ‎ 9.9 ounces
    • Dimensions ‏ : ‎ 8 x 0.23 x 10 inches
    • Best Sellers Rank: #150,260 in Books (See Top 100 i
  • Cybersecurity guide: 3 Books in 1 - From Beginner to Pro: The Complete Guide to Developing and Implementing Effective Cybersecurity Strategies in Three Levels. Paperback – April 12, 2023

    by Ethan Logan (Author)
    5.0 5.0 out of 5 stars    30 ratings
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$4.95 to buyYou Earn: 30 pts
    •  
    • Paperback
      $24.95
      You Earn: 25 pts 
       
      1 New from $24.95
    This comprehensive guide offers three books in one, providing readers with a complete journey from beginner to pro in the field of cybersecurity. The first book is tailored to beginners, offering an introduction to cybersecurity and outlining strategies for developing and implementing effective security measures. The middle-level guide delves deeper into the subject matter, offering a more detailed analysis of cybersecurity threats and providing readers with practical tools and techniques to enhance their security posture. Finally, the pro-level guide provides advanced insights into cybersecurity strategies, offering detailed advice on how to develop and implement effective security protocols at the highest levels. Whether you're a novice or a seasoned pro, this guide has something to offer, providing readers with the knowledge and tools needed to stay ahead of the ever-evolving landscape of cybersecurity threats.

    Product details

    • ASIN ‏ : ‎ B0C2SD1JRS
    • Publisher ‏ : ‎ Independently published (April 12, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 342 pages
    • ISBN-13 ‏ : ‎ 979-8391130697
    • Item Weight ‏ : ‎ 1.29 pounds
    • Dimensions ‏ : ‎ 6 x 0.86 x 9 inches
    • Best Sellers Rank: #528,485 in Books (See Top 100 in Books)
      • #1,225 in Computer Security & Encryption (Books)
    • Customer Reviews: 
      5.0 5.0 out of 5 stars    30 ratings
    b0c2sd1jrs.01. sclzzzzzzz sx500
    b0c2sd1jrs.01. sclzzzzzzz sx500

    Cybersecurity guide: 3 Books in 1 - From Beginner to Pro: The Complete Guide to Developing and Implementing Effective Cybersecurity Strategies in Three Levels. Paperback – April 12, 2023

    by Ethan Logan (Author)
    5.0 5.0 out of 5 stars    30 ratings
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$4.95 to buyYou Earn: 30 pts
    •  
    • Paperback
      $24.95
      You Earn: 25 pts 
       
      1 New from $24.95
    This comprehensive guide offers three books in one, providing readers with a complete journey from beginner to pro in the field of cybersecurity. The first book is tailored to beginners, offering an introduction to cybersecurity and outlining strategies for developing and implementing effective security measures. The middle-level guide delves deeper into the subject matter, offering a more detailed analysis of cybersecurity threats and providing readers with practical tools and techniques to enhance their security posture. Finally, the pro-level guide provides advanced insights into cybersecurity strategies, offering detailed advice on how to develop and implement effective security protocols at the highest levels. Whether you're a novice or a seasoned pro, this guide has something to offer, providing readers with the knowledge and tools needed to stay ahead of the ever-evolving landscape of cybersecurity threats.

    Product details

    • ASIN ‏ : ‎ B0C2SD1JRS
    • Publisher ‏ : ‎ Independently published (April 12, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 342 pages
    • ISBN-13 ‏ : ‎ 979-8391130697
    • Item Weight ‏ : ‎ 1.29 pounds
    • Dimensions ‏ : ‎ 6 x 0.86 x 9 inches
    • Best Sellers Rank: #528,485 in Books (See Top 100 in Books)
      • #1,225 in Computer Security & Encryption (Books)
    • Customer Reviews: 
      5.0 5.0 out of 5 stars    30 ratings
  • Forensic Data Collections 2.0: A Selection of Trusted Digital Forensics Content Paperback – February 27, 2023

    by Robert B. Fried (Author)
    5.0 5.0 out of 5 stars    5 ratings
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$2.99 to buyYou Earn: 18 pts
    •  
    • Paperback
      $12.95
      You Earn: 13 pts 
       
      1 New from $12.95
    With over 20 years of experience, digital forensics expert, licensed private investigator, and trusted advisor to multinational law firms and corporations, Robert B. Fried, shares a selection of articles that he has authored on topics, as related to forensics and investigations.

    Forensic Data Collections 2.0
    A Selection of Trusted Digital Forensics Content

    ARTICLES INCLUDED
    • BEING A TRUSTED ADVISOR
    • BRING YOUR OWN DEVICE (BYOD) POLICIES
    • CLOUD ATTACHMENTS
    • CLOUD STORAGE SERVICES
    • CRYPTOCURRENCY
    • DIGITAL ASSISTANTS
    • DIGITAL FOOTPRINTS
    • DIGITAL FORENSIC LABORATORY ACCREDITATION
    • EMAIL EVIDENCE
    • EVIDENCE MANAGEMENT
    • FORENSIC FUNDAMENTALS
    • FORENSIC VALIDATION
    • INTERNET OF THINGS (IoT)
    • KNOWING YOUR AUDIENCE
    • REMOTE DATA COLLECTIONS

    "Robert once again brings tremendous value to digital forensics practitioners by distilling his decades of real-world technical expertise with strong, clear, and concise writing."
    - Arman Gungor
    Founder & CEO:Metaspike

    "Forensic Data Collections 2.0: A Selection of Trusted Digital Forensics Content includes a compilation of Robert's published articles, an enjoyable read for investigators and laypersons - limpid as a cold blue lake on a mountain! The manner in which he conveys information allows the tech-curious private investigator to feel smart and look good. The knowledge Robert shares allows me to grasp digital data-collection, engage with clients across a variety of scenarios, and ask relevant questions before hiring a forensic examiner."
    - Emmanuelle Welch, LPI, CFE
    Founder: French Connection Research

    "Robert's years of experience in the digital forensics space are captured here in a series of his best articles. The reader will find them to be insightful and useful as a guide, in pursuit of world-class defensible practices."
    - Nelson L. Eby
    Director, Enterprise Forensics and eDiscovery: GE Healthcare
    Read less
       Repo

    Product details

    • ASIN ‏ : ‎ B0BW2SXG7D
    • Publisher ‏ : ‎ Forensics by Fried (February 27, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 112 pages
    • ISBN-13 ‏ : ‎ 979-8218147211
    • Item Weight ‏ : ‎ 7.8 ounces
    • Dimensions ‏ : ‎ 6 x 0.26 x 9 inches
    • Best Sellers Rank: #1,004,368 in Books (See Top 100 in B
    b0bw2sxg7d.01. sclzzzzzzz sx500
    b0bw2sxg7d.01. sclzzzzzzz sx500

    Forensic Data Collections 2.0: A Selection of Trusted Digital Forensics Content Paperback – February 27, 2023

    by Robert B. Fried (Author)
    5.0 5.0 out of 5 stars    5 ratings
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$2.99 to buyYou Earn: 18 pts
    •  
    • Paperback
      $12.95
      You Earn: 13 pts 
       
      1 New from $12.95
    With over 20 years of experience, digital forensics expert, licensed private investigator, and trusted advisor to multinational law firms and corporations, Robert B. Fried, shares a selection of articles that he has authored on topics, as related to forensics and investigations.

    Forensic Data Collections 2.0
    A Selection of Trusted Digital Forensics Content

    ARTICLES INCLUDED
    • BEING A TRUSTED ADVISOR
    • BRING YOUR OWN DEVICE (BYOD) POLICIES
    • CLOUD ATTACHMENTS
    • CLOUD STORAGE SERVICES
    • CRYPTOCURRENCY
    • DIGITAL ASSISTANTS
    • DIGITAL FOOTPRINTS
    • DIGITAL FORENSIC LABORATORY ACCREDITATION
    • EMAIL EVIDENCE
    • EVIDENCE MANAGEMENT
    • FORENSIC FUNDAMENTALS
    • FORENSIC VALIDATION
    • INTERNET OF THINGS (IoT)
    • KNOWING YOUR AUDIENCE
    • REMOTE DATA COLLECTIONS

    "Robert once again brings tremendous value to digital forensics practitioners by distilling his decades of real-world technical expertise with strong, clear, and concise writing."
    - Arman Gungor
    Founder & CEO:Metaspike

    "Forensic Data Collections 2.0: A Selection of Trusted Digital Forensics Content includes a compilation of Robert's published articles, an enjoyable read for investigators and laypersons - limpid as a cold blue lake on a mountain! The manner in which he conveys information allows the tech-curious private investigator to feel smart and look good. The knowledge Robert shares allows me to grasp digital data-collection, engage with clients across a variety of scenarios, and ask relevant questions before hiring a forensic examiner."
    - Emmanuelle Welch, LPI, CFE
    Founder: French Connection Research

    "Robert's years of experience in the digital forensics space are captured here in a series of his best articles. The reader will find them to be insightful and useful as a guide, in pursuit of world-class defensible practices."
    - Nelson L. Eby
    Director, Enterprise Forensics and eDiscovery: GE Healthcare
    Read less
       Repo

    Product details

    • ASIN ‏ : ‎ B0BW2SXG7D
    • Publisher ‏ : ‎ Forensics by Fried (February 27, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 112 pages
    • ISBN-13 ‏ : ‎ 979-8218147211
    • Item Weight ‏ : ‎ 7.8 ounces
    • Dimensions ‏ : ‎ 6 x 0.26 x 9 inches
    • Best Sellers Rank: #1,004,368 in Books (See Top 100 in B
  • Network Basics for Hackers: How Networks Work and How They Break Paperback – January 10, 2023

    by Master OccupytheWeb (Author)
    4.6 4.6 out of 5 stars    59 ratings
    See all formats and editions

    • Paperback
      $35.99
      You Earn: 36 pts 
       
      1 New from $35.99
    Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple.

    This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application.

    In the final chapters, OTW leads the reader through some of the networks on the leading-edge of cybersecurity, such as Car, Radio, and Industrial networks. There has never been book quite like this one!

    Product details

    • ASIN ‏ : ‎ B0BS3GZ1R9
    • Publisher ‏ : ‎ Independently published (January 10, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 276 pages
    • ISBN-13 ‏ : ‎ 979-8373290043
    • Item Weight ‏ : ‎ 1.52 pounds
    • Dimensions ‏ : ‎ 8.5 x 0.63 x 11 inches
    • Best Sellers Rank: #14,124 in Books (See Top 100 in Books)
      • #3 in Computer Networks, Protocols & APIs (Books)
      • #5 in Computer Network Security
      • #11 in Computer Hacking
    b0bs3gz1r9.01. sclzzzzzzz sx500
    b0bs3gz1r9.01. sclzzzzzzz sx500

    Network Basics for Hackers: How Networks Work and How They Break Paperback – January 10, 2023

    by Master OccupytheWeb (Author)
    4.6 4.6 out of 5 stars    59 ratings
    See all formats and editions

    • Paperback
      $35.99
      You Earn: 36 pts 
       
      1 New from $35.99
    Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple.

    This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application.

    In the final chapters, OTW leads the reader through some of the networks on the leading-edge of cybersecurity, such as Car, Radio, and Industrial networks. There has never been book quite like this one!

    Product details

    • ASIN ‏ : ‎ B0BS3GZ1R9
    • Publisher ‏ : ‎ Independently published (January 10, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 276 pages
    • ISBN-13 ‏ : ‎ 979-8373290043
    • Item Weight ‏ : ‎ 1.52 pounds
    • Dimensions ‏ : ‎ 8.5 x 0.63 x 11 inches
    • Best Sellers Rank: #14,124 in Books (See Top 100 in Books)
      • #3 in Computer Networks, Protocols & APIs (Books)
      • #5 in Computer Network Security
      • #11 in Computer Hacking
  • Practical Cybersecurity: A Fat-Free Guide to Network Security Best Practices (Fat-Free Technology Guides) Paperback – January 1, 2023

    by Nicholas Marsh (Author)
    5.0 5.0 out of 5 stars    7 ratings
    Part of: Fat-Free Technology Guides (4 books)
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$6.98 to buyYou Earn: 42 pts
    •  
    • Paperback
      $24.98
      You Earn: 25 pts 
       
      2 New from $20.99

    Covers over 250 cybersecurity best practices.

    Cybercrime is one of the greatest threats to humanity to emerge since the cold war. No individual or organization is immune to malicious threats, and the risk increases every day. In the blink of an eye, cybercrime can ruin the prosperity of an individual or an entire organization. There currently is no way to guarantee safety with 100% certainty, because the risks are constantly evolving. However, with the right practices, policies, and products in place you can reduce the likelihood of being compromised down to a statistical anomaly.

    Practical Cybersecurity is a comprehensive “Fat-Free” guide for people who want to learn how to secure their technology assets, and optionally obtain CompTIA Security+ certification. In this guide, you will learn simple actionable steps that the average system administrator can take to build more secure networks.

    Your typical cybersecurity book will tell you why it’s important to secure your network, but many fail to clearly and concisely explain how to actually go about it. Practical Cybersecurity is different because you will learn both the "why" and the "how" in one easy to follow book. Each subject is demonstrated with real world scenarios and includes configuration examples that demystify the topic.
    • ASIN ‏ : ‎ B0BRGW8D1K
    • Publisher ‏ : ‎ Independently published (January 1, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 397 pages
    • ISBN-13 ‏ : ‎ 979-8359387897
    • Item Weight ‏ : ‎ 1.19 pounds
    • Dimensions ‏ : ‎ 6 x 0.9 x 9 inches
    • Best Sellers Rank: #557,879 in Books (See Top 100 in Books)
      • #380 in Computer Network Security
    b0brgw8d1k.01. sclzzzzzzz sx500
    b0brgw8d1k.01. sclzzzzzzz sx500

    Practical Cybersecurity: A Fat-Free Guide to Network Security Best Practices (Fat-Free Technology Guides) Paperback – January 1, 2023

    by Nicholas Marsh (Author)
    5.0 5.0 out of 5 stars    7 ratings
    Part of: Fat-Free Technology Guides (4 books)
    See all formats and editions

    • Kindle
      $0.00 
      Read with Kindle Unlimited to also enjoy access to over 4 million more titles$6.98 to buyYou Earn: 42 pts
    •  
    • Paperback
      $24.98
      You Earn: 25 pts 
       
      2 New from $20.99

    Covers over 250 cybersecurity best practices.

    Cybercrime is one of the greatest threats to humanity to emerge since the cold war. No individual or organization is immune to malicious threats, and the risk increases every day. In the blink of an eye, cybercrime can ruin the prosperity of an individual or an entire organization. There currently is no way to guarantee safety with 100% certainty, because the risks are constantly evolving. However, with the right practices, policies, and products in place you can reduce the likelihood of being compromised down to a statistical anomaly.

    Practical Cybersecurity is a comprehensive “Fat-Free” guide for people who want to learn how to secure their technology assets, and optionally obtain CompTIA Security+ certification. In this guide, you will learn simple actionable steps that the average system administrator can take to build more secure networks.

    Your typical cybersecurity book will tell you why it’s important to secure your network, but many fail to clearly and concisely explain how to actually go about it. Practical Cybersecurity is different because you will learn both the "why" and the "how" in one easy to follow book. Each subject is demonstrated with real world scenarios and includes configuration examples that demystify the topic.
    • ASIN ‏ : ‎ B0BRGW8D1K
    • Publisher ‏ : ‎ Independently published (January 1, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 397 pages
    • ISBN-13 ‏ : ‎ 979-8359387897
    • Item Weight ‏ : ‎ 1.19 pounds
    • Dimensions ‏ : ‎ 6 x 0.9 x 9 inches
    • Best Sellers Rank: #557,879 in Books (See Top 100 in Books)
      • #380 in Computer Network Security
  • CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 1 - Preparation, Threat Response, & Post-Incident Activity (Cybersecurity Masters Guides) Paperback – June 24, 2020

    by Colby A Clark (Author), Ireland J Clark (Illustrator)
    5.0 5.0 out of 5 stars    31 ratings
    Book 1 of 2: Cybersecurity Masters Guides

    Product details

    • ASIN ‏ : ‎ B08BTZ8KGT
    • Publisher ‏ : ‎ Independently published (June 24, 2020)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 509 pages
    • ISBN-13 ‏ : ‎ 979-8656487900
    • Item Weight ‏ : ‎ 1.99 pounds
    • Dimensions ‏ : ‎ 7.44 x 1.15 x 9.69 inches
    • Best Sellers Rank: #724,780 in Books (See Top 100 in Books)
      • #147 in Computer Viruses
    • Customer Reviews: 
      5.0 5.0 out of 5 stars    31 ratings
    b08btz8kgt.01. sclzzzzzzz sx500
    b08btz8kgt.01. sclzzzzzzz sx500

    CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 1 - Preparation, Threat Response, & Post-Incident Activity (Cybersecurity Masters Guides) Paperback – June 24, 2020

    by Colby A Clark (Author), Ireland J Clark (Illustrator)
    5.0 5.0 out of 5 stars    31 ratings
    Book 1 of 2: Cybersecurity Masters Guides

    Product details

    • ASIN ‏ : ‎ B08BTZ8KGT
    • Publisher ‏ : ‎ Independently published (June 24, 2020)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 509 pages
    • ISBN-13 ‏ : ‎ 979-8656487900
    • Item Weight ‏ : ‎ 1.99 pounds
    • Dimensions ‏ : ‎ 7.44 x 1.15 x 9.69 inches
    • Best Sellers Rank: #724,780 in Books (See Top 100 in Books)
      • #147 in Computer Viruses
    • Customer Reviews: 
      5.0 5.0 out of 5 stars    31 ratings
  • Principles of Information Security 6th Edition

    by Michael E. Whitman (Author), Herbert J. Mattord (Author)
    4.4 4.4 out of 5 stars    348 ratings
     
    3.5 on Goodreads
     
    201 ratings
    See all formats and editions

    • Kindle
      $46.99 - $81.99
      Read with Our Free App
    •  
    • Paperback
      $40.48 - $42.99 
       
      15 Used from $35.003 New from $42.781 Collectible from $32.99

    There is a newer edition of this item:

    Principles of Information Security (MindTap Course List)
    Principles of Information Security (MindTap Course List)
    $93.61
     (29)
    In Stock.
    Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps.

    Product details

    • ASIN ‏ : ‎ 1337102067
    • Publisher ‏ : ‎ Cengage Learning; 6th edition (March 13, 2017)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 656 pages
    • ISBN-10 ‏ : ‎ 9781337102063
    • ISBN-13 ‏ : ‎ 978-1337102063
    • Item Weight ‏ : ‎ 3 pounds
    • Dimensions ‏ : ‎ 7.25 x 1.25 x 9 inches
    • Best Sellers Rank: #168,886 in Books (See Top 100 in Book
     Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.
     
    b07124fygz.01. sclzzzzzzz sx500
    b07124fygz.01. sclzzzzzzz sx500

    Principles of Information Security 6th Edition

    by Michael E. Whitman (Author), Herbert J. Mattord (Author)
    4.4 4.4 out of 5 stars    348 ratings
     
    3.5 on Goodreads
     
    201 ratings
    See all formats and editions

    • Kindle
      $46.99 - $81.99
      Read with Our Free App
    •  
    • Paperback
      $40.48 - $42.99 
       
      15 Used from $35.003 New from $42.781 Collectible from $32.99

    There is a newer edition of this item:

    Principles of Information Security (MindTap Course List)
    Principles of Information Security (MindTap Course List)
    $93.61
     (29)
    In Stock.
    Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps.

    Product details

    • ASIN ‏ : ‎ 1337102067
    • Publisher ‏ : ‎ Cengage Learning; 6th edition (March 13, 2017)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 656 pages
    • ISBN-10 ‏ : ‎ 9781337102063
    • ISBN-13 ‏ : ‎ 978-1337102063
    • Item Weight ‏ : ‎ 3 pounds
    • Dimensions ‏ : ‎ 7.25 x 1.25 x 9 inches
    • Best Sellers Rank: #168,886 in Books (See Top 100 in Book
     Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.
     
  • E-Discovery: An Introduction to Digital Evidence (with DVD) 1st Edition

    by Amelia Phillips (Author), Ronald Godfrey (Author), & 2 more
    4.2 4.2 out of 5 stars    89 ratings
    See all formats and editions

    • Kindle
      $46.99 - $81.99
      Read with Our Free App
    •  
    • Paperback
      $32.76 - $60.08 
       
      7 Used from $15.0311 New from $52.90
    Essential for anyone who works with technology in the field, E-DISCOVERY is a "hands-on, how-to" training guide that provides readers with comprehensive coverage of the technology used in e-discovery in civil and criminal cases. From discovery identification to collection, processing, review, production, and trial presentation, this practical text covers everything the reader needs to know about e-discovery, including the Federal Rules of Civil Procedure, Federal Rules of Criminal Procedure, and Federal Rules of Evidence. Throughout the text, the reader will have the opportunity to work with e-discovery tools such as Discovery Attender, computer forensics tools such as AccessData's Forensics ToolKit, as well as popular processing and review platforms such as iConect, Concordance, and iPro. An interactive courtroom tutorial and use of Trial Director are included to complete the litigation cycle. Multiple tools are discussed for each phase, giving the reader a good selection of potential resources for each task. Finally , real-life examples are woven throughout the text, revealing little talked-about potential pitfalls, as well as best practice and cost management suggestions.

    Product details

    • Publisher ‏ : ‎ Cengage Learning; 1st edition (August 7, 2013)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 320 pages
    • ISBN-10 ‏ : ‎ 1111310645
    • ISBN-13 ‏ : ‎ 978-1111310646
    • Item Weight ‏ : ‎ 15.2 ounces
    b00h7ht5a0.01. sclzzzzzzz sx500
    b00h7ht5a0.01. sclzzzzzzz sx500

    E-Discovery: An Introduction to Digital Evidence (with DVD) 1st Edition

    by Amelia Phillips (Author), Ronald Godfrey (Author), & 2 more
    4.2 4.2 out of 5 stars    89 ratings
    See all formats and editions

    • Kindle
      $46.99 - $81.99
      Read with Our Free App
    •  
    • Paperback
      $32.76 - $60.08 
       
      7 Used from $15.0311 New from $52.90
    Essential for anyone who works with technology in the field, E-DISCOVERY is a "hands-on, how-to" training guide that provides readers with comprehensive coverage of the technology used in e-discovery in civil and criminal cases. From discovery identification to collection, processing, review, production, and trial presentation, this practical text covers everything the reader needs to know about e-discovery, including the Federal Rules of Civil Procedure, Federal Rules of Criminal Procedure, and Federal Rules of Evidence. Throughout the text, the reader will have the opportunity to work with e-discovery tools such as Discovery Attender, computer forensics tools such as AccessData's Forensics ToolKit, as well as popular processing and review platforms such as iConect, Concordance, and iPro. An interactive courtroom tutorial and use of Trial Director are included to complete the litigation cycle. Multiple tools are discussed for each phase, giving the reader a good selection of potential resources for each task. Finally , real-life examples are woven throughout the text, revealing little talked-about potential pitfalls, as well as best practice and cost management suggestions.

    Product details

    • Publisher ‏ : ‎ Cengage Learning; 1st edition (August 7, 2013)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 320 pages
    • ISBN-10 ‏ : ‎ 1111310645
    • ISBN-13 ‏ : ‎ 978-1111310646
    • Item Weight ‏ : ‎ 15.2 ounces
  • Handbook of Electronic Security and Digital Forensics

    by Hamid Jahankhani (Author), & 2 more
    See all formats and editions

    • Hardcover
      $75.00 - $149.84 
       
      6 Used from $71.207 New from $129.99

    The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals.

    This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.

    Product details

    • Publisher ‏ : ‎ WSPC (April 1, 2010)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 708 pages
    • ISBN-10 ‏ : ‎ 9812837035
    • ISBN-13 ‏ : ‎ 978-9812837035
    • Item Weight ‏ : ‎ 3.25 pounds
    • Dimensions ‏ : ‎ 6.69 x 1.5 x 9.61 inches
    9812837035.01. sclzzzzzzz sx500
    9812837035.01. sclzzzzzzz sx500

    Handbook of Electronic Security and Digital Forensics

    by Hamid Jahankhani (Author), & 2 more
    See all formats and editions

    • Hardcover
      $75.00 - $149.84 
       
      6 Used from $71.207 New from $129.99

    The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals.

    This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.

    Product details

    • Publisher ‏ : ‎ WSPC (April 1, 2010)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 708 pages
    • ISBN-10 ‏ : ‎ 9812837035
    • ISBN-13 ‏ : ‎ 978-9812837035
    • Item Weight ‏ : ‎ 3.25 pounds
    • Dimensions ‏ : ‎ 6.69 x 1.5 x 9.61 inches
    • Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.


       


      Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?


       


      After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.

      ASIN ‏ : ‎ B009AI90KO
    • Publisher ‏ : ‎ Auerbach Publications; 1st edition (December 11, 2008)
    • Publication date ‏ : ‎ December 11, 2008
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 5484 KB
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled

     Raoul Chiesa (Author), Stefania Ducci (Author), Silvio Ciappi (Author

    81xjavpk15l. ac ul400
    81xjavpk15l. ac ul400
    • Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.


       


      Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?


       


      After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.

      ASIN ‏ : ‎ B009AI90KO
    • Publisher ‏ : ‎ Auerbach Publications; 1st edition (December 11, 2008)
    • Publication date ‏ : ‎ December 11, 2008
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 5484 KB
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled

     Raoul Chiesa (Author), Stefania Ducci (Author), Silvio Ciappi (Author

  • Breaking Down Digital Investigating Hardcover – May 10, 2023

    by Dr. Erik Choron (Author)
    To the point: technology is advancing daily. Law enforcement agencies are faced with the challenge of keeping up with the latest techniques and tools needed to effectively collect and analyze digital evidence. Digital forensics has become an increasingly important aspect of criminal investigations, with evidence obtained from computers, smartphones, and other digital devices often playing a crucial role in solving cases and securing convictions.
    • ASIN ‏ : ‎ B0C4X2WXXF
    • Publisher ‏ : ‎ Independently published (May 10, 2023)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 135 pages
    • ISBN-13 ‏ : ‎ 979-8394259180
    • Item Weight ‏ : ‎ 9.3 ounces
    71rld6cpk1l
    71rld6cpk1l

    Breaking Down Digital Investigating Hardcover – May 10, 2023

    by Dr. Erik Choron (Author)
    To the point: technology is advancing daily. Law enforcement agencies are faced with the challenge of keeping up with the latest techniques and tools needed to effectively collect and analyze digital evidence. Digital forensics has become an increasingly important aspect of criminal investigations, with evidence obtained from computers, smartphones, and other digital devices often playing a crucial role in solving cases and securing convictions.
    • ASIN ‏ : ‎ B0C4X2WXXF
    • Publisher ‏ : ‎ Independently published (May 10, 2023)
    • Language ‏ : ‎ English
    • Hardcover ‏ : ‎ 135 pages
    • ISBN-13 ‏ : ‎ 979-8394259180
    • Item Weight ‏ : ‎ 9.3 ounces
  • Digital Forensics and Internet of Things: Impact and Challenges 1st Edition, Kindle Edition

    by Anita Gehlot (Editor), Rajesh Singh (Editor), Jaskaran Singh (Editor), Neeta Raj Sharma (Edito

    The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn’t live on the device itself, but rather in the provider’s cloud platform. If you can get the data off the device, you’ll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking.

    • ASIN ‏ : ‎ B09VS4R44W
    • Publisher ‏ : ‎ Wiley-Scrivener; 1st edition (March 15, 2022)
    • Publication date ‏ : ‎ March 15, 2022
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 7791 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    61xvld8eoyl
    61xvld8eoyl

    Digital Forensics and Internet of Things: Impact and Challenges 1st Edition, Kindle Edition

    by Anita Gehlot (Editor), Rajesh Singh (Editor), Jaskaran Singh (Editor), Neeta Raj Sharma (Edito

    The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn’t live on the device itself, but rather in the provider’s cloud platform. If you can get the data off the device, you’ll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking.

    • ASIN ‏ : ‎ B09VS4R44W
    • Publisher ‏ : ‎ Wiley-Scrivener; 1st edition (March 15, 2022)
    • Publication date ‏ : ‎ March 15, 2022
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 7791 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
  • Cyber Investigations 1st Edition, Kindle Edition

    by André Årnes (Editor)  

    Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence, a research-based chapter on anonymization, and a deep-dive in to multimedia forensics. The content is structured in a consistent manner, with an emphasis on accessibility for students of computer science, information security, law enforcement, and military disciplines.

    • ASIN ‏ : ‎ B0BHPV5PG5
    • Publisher ‏ : ‎ Wiley; 1st edition (October 7, 2022)
    • Publication date ‏ : ‎ October 7, 2022
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 8648 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Best Sellers Rank: #2,039,986 in Kindle Store (See Top 100 in Kindle Store)
      • #238 in Pathology Forensic Medicine
      • #980 in Forensic Medicine (Books)
    61myvwmr9vl
    61myvwmr9vl

    Cyber Investigations 1st Edition, Kindle Edition

    by André Årnes (Editor)  

    Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence, a research-based chapter on anonymization, and a deep-dive in to multimedia forensics. The content is structured in a consistent manner, with an emphasis on accessibility for students of computer science, information security, law enforcement, and military disciplines.

    • ASIN ‏ : ‎ B0BHPV5PG5
    • Publisher ‏ : ‎ Wiley; 1st edition (October 7, 2022)
    • Publication date ‏ : ‎ October 7, 2022
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 8648 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Best Sellers Rank: #2,039,986 in Kindle Store (See Top 100 in Kindle Store)
      • #238 in Pathology Forensic Medicine
      • #980 in Forensic Medicine (Books)
  • Digital Forensics (Odysseys in Crime Scene Science) Library Binding – July 15, 2017

    by Valerie Bodden (Author)
    See all formats and editions

    • Library Binding
      from $24.76 
       
      1 Used from $24.763 New from $30.95
    •  
    • Paperback
      $13.79
      You Earn: 14 pts 
       
      1 Used from $10.506 New from $11.27
     
    "An in-depth look at how digital forensic examiners analyze devices with forensic tools to prevent cybercrimes and catch criminals, employing real-life examples such as the BTK killer case"--

    Product details

    • Publisher ‏ : ‎ Creative Educ (July 15, 2017)
    • Language ‏ : ‎ English
    • Library Binding ‏ : ‎ 80 pages
    • ISBN-10 ‏ : ‎ 1608186806
    • ISBN-13 ‏ : ‎ 978-1608186808
    • Reading age ‏ : ‎ 12 - 17 years
    • Lexile measure ‏ : ‎ 1040L
    • Grade level ‏ : ‎ 7 - 9
    • Item Weight ‏ : ‎ 13.6 ounces
    • Dimensions ‏ : ‎ 6.75 x 0.5 x 9 inches
    • Best Sellers Rank: #8,842,332 in Books (See Top 100 in Books)
      • #261,734 in Teen & Young Adult Books
      • #1,207,727 in Children's Books (Books)
    61jp wl0g3l. sy291 bo1 204 203 ql40 fmwebp
    61jp wl0g3l. sy291 bo1 204 203 ql40 fmwebp

    Digital Forensics (Odysseys in Crime Scene Science) Library Binding – July 15, 2017

    by Valerie Bodden (Author)
    See all formats and editions

    • Library Binding
      from $24.76 
       
      1 Used from $24.763 New from $30.95
    •  
    • Paperback
      $13.79
      You Earn: 14 pts 
       
      1 Used from $10.506 New from $11.27
     
    "An in-depth look at how digital forensic examiners analyze devices with forensic tools to prevent cybercrimes and catch criminals, employing real-life examples such as the BTK killer case"--

    Product details

    • Publisher ‏ : ‎ Creative Educ (July 15, 2017)
    • Language ‏ : ‎ English
    • Library Binding ‏ : ‎ 80 pages
    • ISBN-10 ‏ : ‎ 1608186806
    • ISBN-13 ‏ : ‎ 978-1608186808
    • Reading age ‏ : ‎ 12 - 17 years
    • Lexile measure ‏ : ‎ 1040L
    • Grade level ‏ : ‎ 7 - 9
    • Item Weight ‏ : ‎ 13.6 ounces
    • Dimensions ‏ : ‎ 6.75 x 0.5 x 9 inches
    • Best Sellers Rank: #8,842,332 in Books (See Top 100 in Books)
      • #261,734 in Teen & Young Adult Books
      • #1,207,727 in Children's Books (Books)
  • Memory Dump Analysis Anthology, Volume 8b (Memory Dump Analysis Anthology (Diagnomicon) Book 9) [Print Replica] Kindle Edition

    by Dmitry Vostokov (Author), Software Diagnostics Institute (Author)  Format: Kindle Edition
     
    Book 9 of 17: Memory Dump Analysis Anthology (Diagnomicon)
    See all formats and editions

    • Kindle
      $9.99
      You Earn: 60 pts
      Read with Our Free App
    •  
    • Paperback
      $45.00 
       
      2 Used from $16.1611 New from $45.00
     
    This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, debugging, crash dump analysis, memory forensics, software trace and log analysis written in December 2014 - July 2015 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software, technical support and escalation engineers dealing with complex software issues, security researchers, reverse engineers, malware and memory forensics analysts. This volume is fully cross-referenced with volumes 1 – 7, 8a, and features: - 12 new crash dump analysis patterns; - 15 new software log and trace analysis patterns; - New memory dump analysis case study; - Introduction to articoding; - Introduction to special and general trace and log analysis; - Introduction to projective debugging; - Introduction to artifact-malware; - Introduction to concrete and general problem analysis patterns.

    Product details

    • ASIN ‏ : ‎ B013J9X0LE
    • Publisher ‏ : ‎ OpenTask (August 5, 2015)
    • Publication date ‏ : ‎ August 5, 2015
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 7105 KB
    • Simultaneous device usage ‏ : ‎ Unlimited
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 170 pages
    • Best Sellers Rank: #3,424,432 in Kindle Store (S
    61ftca h0nl. sy346
    61ftca h0nl. sy346

    Memory Dump Analysis Anthology, Volume 8b (Memory Dump Analysis Anthology (Diagnomicon) Book 9) [Print Replica] Kindle Edition

    by Dmitry Vostokov (Author), Software Diagnostics Institute (Author)  Format: Kindle Edition
     
    Book 9 of 17: Memory Dump Analysis Anthology (Diagnomicon)
    See all formats and editions

    • Kindle
      $9.99
      You Earn: 60 pts
      Read with Our Free App
    •  
    • Paperback
      $45.00 
       
      2 Used from $16.1611 New from $45.00
     
    This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, debugging, crash dump analysis, memory forensics, software trace and log analysis written in December 2014 - July 2015 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software, technical support and escalation engineers dealing with complex software issues, security researchers, reverse engineers, malware and memory forensics analysts. This volume is fully cross-referenced with volumes 1 – 7, 8a, and features: - 12 new crash dump analysis patterns; - 15 new software log and trace analysis patterns; - New memory dump analysis case study; - Introduction to articoding; - Introduction to special and general trace and log analysis; - Introduction to projective debugging; - Introduction to artifact-malware; - Introduction to concrete and general problem analysis patterns.

    Product details

    • ASIN ‏ : ‎ B013J9X0LE
    • Publisher ‏ : ‎ OpenTask (August 5, 2015)
    • Publication date ‏ : ‎ August 5, 2015
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 7105 KB
    • Simultaneous device usage ‏ : ‎ Unlimited
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 170 pages
    • Best Sellers Rank: #3,424,432 in Kindle Store (S
  • Memory Dump Analysis Anthology, Volume 7 (Memory Dump Analysis Anthology (Diagnomicon)) [Print Replica] Kindle Edition

    by Dmitry Vostokov (Author), Software Diagnostics Institute (Author)  Format: Kindle Edition
     
    Book 7 of 17: Memory Dump Analysis Anthology (Diagnomicon)
    See all formats and editions

    • Kindle
      $20.00
      You Earn: 120 pts
      Read with Our Free App
    •  
    • Hardcover
      $45.00 
       
      1 Used from $49.0710 New from $45.00
     
    This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute (DumpAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, debugging, crash dump analysis, software trace and log analysis, malware analysis and memory forensics written in November 2011 - May 2014 for software engineers developing and maintaining products on Windows (WinDbg) and Mac OS X (GDB) platforms, quality assurance engineers testing software, technical support and escalation engineers dealing with complex software issues, security researchers, malware analysts, reverse engineers, and memory forensics analysts. The seventh volume features: - 66 new crash dump analysis patterns - 46 new software log and trace analysis patterns - 18 core memory dump analysis patterns for Mac OS X and GDB - 10 malware analysis patterns - Additional unified debugging pattern - Additional user interface problem analysis pattern - Additional pattern classification including memory and log acquisition patterns - Additional .NET memory analysis patterns - Introduction to software problem description patterns - Introduction to software diagnostics patterns - Introduction to general abnormal structure and behavior patterns - Introduction to software disruption patterns - Introduction to static code analysis patterns - Introduction to network trace analysis patterns - Introduction to software diagnostics report schemes - Introduction to elementary software diagnostics patterns - Introduction to patterns of software diagnostics architecture - Introduction to patterns of disassembly, reconstruction and reversing - Introduction to vulnerability analysis patterns - Fully cross-referenced with Volume 1, Volume 2, Volume 3, Volume 4, Volume 5, and Volume 6.

    Product details

    • ASIN ‏ : ‎ B012P5199S
    • Publisher ‏ : ‎ OpenTask (July 26, 2015)
    • Publication date ‏ : ‎ July 26, 2015
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 19024 KB
    • Simultaneous device usage ‏ : ‎ Unlimited
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 524 pages
    • Best Sellers Rank: #3,445,917 in Kin
     
    61fgcvlodgl. sy346
    61fgcvlodgl. sy346

    Memory Dump Analysis Anthology, Volume 7 (Memory Dump Analysis Anthology (Diagnomicon)) [Print Replica] Kindle Edition

    by Dmitry Vostokov (Author), Software Diagnostics Institute (Author)  Format: Kindle Edition
     
    Book 7 of 17: Memory Dump Analysis Anthology (Diagnomicon)
    See all formats and editions

    • Kindle
      $20.00
      You Earn: 120 pts
      Read with Our Free App
    •  
    • Hardcover
      $45.00 
       
      1 Used from $49.0710 New from $45.00
     
    This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute (DumpAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, debugging, crash dump analysis, software trace and log analysis, malware analysis and memory forensics written in November 2011 - May 2014 for software engineers developing and maintaining products on Windows (WinDbg) and Mac OS X (GDB) platforms, quality assurance engineers testing software, technical support and escalation engineers dealing with complex software issues, security researchers, malware analysts, reverse engineers, and memory forensics analysts. The seventh volume features: - 66 new crash dump analysis patterns - 46 new software log and trace analysis patterns - 18 core memory dump analysis patterns for Mac OS X and GDB - 10 malware analysis patterns - Additional unified debugging pattern - Additional user interface problem analysis pattern - Additional pattern classification including memory and log acquisition patterns - Additional .NET memory analysis patterns - Introduction to software problem description patterns - Introduction to software diagnostics patterns - Introduction to general abnormal structure and behavior patterns - Introduction to software disruption patterns - Introduction to static code analysis patterns - Introduction to network trace analysis patterns - Introduction to software diagnostics report schemes - Introduction to elementary software diagnostics patterns - Introduction to patterns of software diagnostics architecture - Introduction to patterns of disassembly, reconstruction and reversing - Introduction to vulnerability analysis patterns - Fully cross-referenced with Volume 1, Volume 2, Volume 3, Volume 4, Volume 5, and Volume 6.

    Product details

    • ASIN ‏ : ‎ B012P5199S
    • Publisher ‏ : ‎ OpenTask (July 26, 2015)
    • Publication date ‏ : ‎ July 26, 2015
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 19024 KB
    • Simultaneous device usage ‏ : ‎ Unlimited
    • Text-to-Speech ‏ : ‎ Not enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 524 pages
    • Best Sellers Rank: #3,445,917 in Kin
     
  • Photo Forensics (The MIT Press) Paperback – Picture Book, February 26, 2019

    by Hany Farid (Author)
    4.4 4.4 out of 5 stars    19 ratings
    See all formats and editions

    • Hardcover
      from $173.86 
       
      1 Used from $173.861 New from $288.26
    •  
    • Paperback
      $24.95
      You Earn: 25 pts 
       
      9 Used from $8.4021 New from $16.92
    Extra Savings Save $10 on 1 select item(s)  1 Applicable Promotion 
    The first comprehensive and detailed presentation of techniques for authenticating digital images.

    Photographs have been doctored since photography was invented. Dictators have erased people from photographs and from history. Politicians have manipulated photos for short-term political gain. Altering photographs in the predigital era required time-consuming darkroom work. Today, powerful and low-cost digital technology makes it relatively easy to alter digital images, and the resulting fakes are difficult to detect. The field of photo forensics—pioneered in Hany Farid's lab at Dartmouth College—restores some trust to photography. In this book, Farid describes techniques that can be used to authenticate photos. He provides the intuition and background as well as the mathematical and algorithmic details needed to understand, implement, and utilize a variety of photo forensic techniques.

    Farid traces the entire imaging pipeline. He begins with the physics and geometry of the interaction of light with the physical world, proceeds through the way light passes through a camera lens, the conversion of light to pixel values in the electronic sensor, the packaging of the pixel values into a digital image file, and the pixel-level artifacts introduced by photo-editing software. Modeling the path of light during image creation reveals physical, geometric, and statistical regularities that are disrupted during the creation of a fake. Various forensic techniques exploit these irregularities to detect traces of tampering. A chapter of case studies examines the authenticity of viral video and famously questionable photographs including “Golden Eagle Snatches Kid” and the Lee Harvey Oswald backyard photo.

    Read less
       Report incorrect product information.

    1. Print length
       
      336 pages
    2. Language
       
      English
    3.  
       
       
    4.  
       
       
    5.  
       
       
    6.  
       
       
    7.  
       
       
    Next page

    Amazon First Reads | Editors' picks at exclusive prices
     

    Product details

    • Publisher ‏ : ‎ The MIT Press; Reprint edition (February 26, 2019)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 336 pages
    • ISBN-10 ‏ : ‎ 0262537001
    • ISBN-13 ‏ : ‎ 978-0262537001
    • Item Weight ‏ : ‎ 1.7 pounds
    • Dimensions ‏ : ‎ 7.63 x 0.69 x 8.81 inches
    • Best Sellers Rank: #1,895,319 in Books (See Top 100 in Books)
      • #336 in Computer Vision & Pattern Recogn

    Frequently bought together

    61bsgorazil. sx218 bo1 204 203 ql40 fmwebp
    61bsgorazil. sx218 bo1 204 203 ql40 fmwebp

    Photo Forensics (The MIT Press) Paperback – Picture Book, February 26, 2019

    by Hany Farid (Author)
    4.4 4.4 out of 5 stars    19 ratings
    See all formats and editions

    • Hardcover
      from $173.86 
       
      1 Used from $173.861 New from $288.26
    •  
    • Paperback
      $24.95
      You Earn: 25 pts 
       
      9 Used from $8.4021 New from $16.92
    Extra Savings Save $10 on 1 select item(s)  1 Applicable Promotion 
    The first comprehensive and detailed presentation of techniques for authenticating digital images.

    Photographs have been doctored since photography was invented. Dictators have erased people from photographs and from history. Politicians have manipulated photos for short-term political gain. Altering photographs in the predigital era required time-consuming darkroom work. Today, powerful and low-cost digital technology makes it relatively easy to alter digital images, and the resulting fakes are difficult to detect. The field of photo forensics—pioneered in Hany Farid's lab at Dartmouth College—restores some trust to photography. In this book, Farid describes techniques that can be used to authenticate photos. He provides the intuition and background as well as the mathematical and algorithmic details needed to understand, implement, and utilize a variety of photo forensic techniques.

    Farid traces the entire imaging pipeline. He begins with the physics and geometry of the interaction of light with the physical world, proceeds through the way light passes through a camera lens, the conversion of light to pixel values in the electronic sensor, the packaging of the pixel values into a digital image file, and the pixel-level artifacts introduced by photo-editing software. Modeling the path of light during image creation reveals physical, geometric, and statistical regularities that are disrupted during the creation of a fake. Various forensic techniques exploit these irregularities to detect traces of tampering. A chapter of case studies examines the authenticity of viral video and famously questionable photographs including “Golden Eagle Snatches Kid” and the Lee Harvey Oswald backyard photo.

    Read less
       Report incorrect product information.

    1. Print length
       
      336 pages
    2. Language
       
      English
    3.  
       
       
    4.  
       
       
    5.  
       
       
    6.  
       
       
    7.  
       
       
    Next page

    Amazon First Reads | Editors' picks at exclusive prices
     

    Product details

    • Publisher ‏ : ‎ The MIT Press; Reprint edition (February 26, 2019)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 336 pages
    • ISBN-10 ‏ : ‎ 0262537001
    • ISBN-13 ‏ : ‎ 978-0262537001
    • Item Weight ‏ : ‎ 1.7 pounds
    • Dimensions ‏ : ‎ 7.63 x 0.69 x 8.81 inches
    • Best Sellers Rank: #1,895,319 in Books (See Top 100 in Books)
      • #336 in Computer Vision & Pattern Recogn

    Frequently bought together

  • Understanding Cyber-Warfare 2nd Edition

    by Christopher Whyte (Author), Brian Mazanec (Author)
    See all formats and editions

    • Kindle
      $23.63 - $31.78
      Read with Our Free App
    •  
    • Hardcover
      $140.88 - $160.00 
       
      1 Used from $139.2210 New from $140.88
    •  
    • Paperback
      $42.94 
       
      4 Used from $49.4511 New from $38.56

    This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters.

    Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR) and operational practice associated with computer network attack, computer network exploitation and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors.

    Specifically, the book provides a comprehensive overview of several key issue areas:

    • The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation and defense
    • An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of IR, security studies, psychology and science, technology and society (STS) studies
    • Current national perspectives, policies, doctrines and strategies relevant to cyber warfare
    • An examination of key challenges in international law, norm development and deterrence; and
    • The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict

    This textbook will be essential reading for stud

    • Publisher ‏ : ‎ Routledge; 2nd edition (April 19, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 340 pages
    • ISBN-10 ‏ : ‎ 1032159316
    • ISBN-13 ‏ : ‎ 978-1032159317
    • Item Weight ‏ : ‎ 1.48 pounds
    • Dimensions ‏ : ‎ 6.85 x 0.82 x 9.69 inches
    • Best Sellers Rank: #160,601 in Books (See Top 100 in Books)
      • #185 in National & International Security (Books)
      • #192 in Intelligence & Espionage H

    en

    61biypdo1al. sx351 bo1 204 203
    61biypdo1al. sx351 bo1 204 203

    Understanding Cyber-Warfare 2nd Edition

    by Christopher Whyte (Author), Brian Mazanec (Author)
    See all formats and editions

    • Kindle
      $23.63 - $31.78
      Read with Our Free App
    •  
    • Hardcover
      $140.88 - $160.00 
       
      1 Used from $139.2210 New from $140.88
    •  
    • Paperback
      $42.94 
       
      4 Used from $49.4511 New from $38.56

    This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters.

    Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR) and operational practice associated with computer network attack, computer network exploitation and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors.

    Specifically, the book provides a comprehensive overview of several key issue areas:

    • The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation and defense
    • An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of IR, security studies, psychology and science, technology and society (STS) studies
    • Current national perspectives, policies, doctrines and strategies relevant to cyber warfare
    • An examination of key challenges in international law, norm development and deterrence; and
    • The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict

    This textbook will be essential reading for stud

    • Publisher ‏ : ‎ Routledge; 2nd edition (April 19, 2023)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 340 pages
    • ISBN-10 ‏ : ‎ 1032159316
    • ISBN-13 ‏ : ‎ 978-1032159317
    • Item Weight ‏ : ‎ 1.48 pounds
    • Dimensions ‏ : ‎ 6.85 x 0.82 x 9.69 inches
    • Best Sellers Rank: #160,601 in Books (See Top 100 in Books)
      • #185 in National & International Security (Books)
      • #192 in Intelligence & Espionage H

    en

  • Cybercrime: Digital Forensic Investigations Pap/DVD Edition

    by Charles Thies (Author)
    See all formats and editions

    • Paperback
      — 
       
     
    This text covers the introduction to digital forensic investigations while applying the rules of evidence and procedure specific to digital evidence. Includes techniques covering Windows, Linux, and Macintosh platforms and digital forensics in network, mobile, and Cloud investigations.

    The strategy for this text is to introduce cybercrime, computer law and the application of the rules of evidence and procedure related to digital investigations. The text also covers the technical aspects of the investigation which includes an examination of the digital evidence, managing the investigation, and presentation of the evidence in the courts. The text includes case studies that are used to reinforce learning. Completing the text will provide the student with a practical hands-on approach to conducting computer investigations involving electronic evidence.

    Features:
    • Covers the technical aspects of the investigation which includes an examination of the digital evidence, managing the investigation, and presentation of the evidence in the courts
    • Includes techniques covering Windows, Linux, and Macintosh platforms and digital forensics in network, mobile, and Cloud investigations
    • Uses latest software and hardware to conduct digital investigations
    • Companion DVD includes forensic software, cases, resources

    Brief Table of Contents:
    1. Introduction to Digital Forensic Investigations. 2. The Forensic Investigators Lab Environment. 3. Computer Law. 4. Building a Forensic Investigators Tool Box. 5. Securing and Processing the Scene. 6. Understanding Windows Files Systems. 7. Working with Macintosh and Linux File Systems. 8. Digital Evidence Validation and Analysis. 9. Exploring E-mail Forensic Analysis. 10. Working with Mobile Devices. 11. Network Forensics. 12. Cyber Forensics in the Cloud. 13. Legal, Privacy, Intellectual Capital Issues in the Cloud. 14. Court Room Preparation and Testimony.

    roduct details

    • Publisher ‏ : ‎ Mercury Learning & Information; Pap/DVD edition (September 15, 2014)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 350 pages
    • ISBN-10 ‏ : ‎ 1938549422
    • ISBN-13 ‏ : ‎ 978-1938549427
    • Item Weight ‏ : ‎ 10.9 ounces
    • Dimensions ‏ : ‎ 0.04 x 7.01 x 9.02 inches
    •  
     
     

    Videos

     
    Read mor
    61 xev2iijl. sx396 bo1 204 203
    61 xev2iijl. sx396 bo1 204 203

    Cybercrime: Digital Forensic Investigations Pap/DVD Edition

    by Charles Thies (Author)
    See all formats and editions

    • Paperback
      — 
       
     
    This text covers the introduction to digital forensic investigations while applying the rules of evidence and procedure specific to digital evidence. Includes techniques covering Windows, Linux, and Macintosh platforms and digital forensics in network, mobile, and Cloud investigations.

    The strategy for this text is to introduce cybercrime, computer law and the application of the rules of evidence and procedure related to digital investigations. The text also covers the technical aspects of the investigation which includes an examination of the digital evidence, managing the investigation, and presentation of the evidence in the courts. The text includes case studies that are used to reinforce learning. Completing the text will provide the student with a practical hands-on approach to conducting computer investigations involving electronic evidence.

    Features:
    • Covers the technical aspects of the investigation which includes an examination of the digital evidence, managing the investigation, and presentation of the evidence in the courts
    • Includes techniques covering Windows, Linux, and Macintosh platforms and digital forensics in network, mobile, and Cloud investigations
    • Uses latest software and hardware to conduct digital investigations
    • Companion DVD includes forensic software, cases, resources

    Brief Table of Contents:
    1. Introduction to Digital Forensic Investigations. 2. The Forensic Investigators Lab Environment. 3. Computer Law. 4. Building a Forensic Investigators Tool Box. 5. Securing and Processing the Scene. 6. Understanding Windows Files Systems. 7. Working with Macintosh and Linux File Systems. 8. Digital Evidence Validation and Analysis. 9. Exploring E-mail Forensic Analysis. 10. Working with Mobile Devices. 11. Network Forensics. 12. Cyber Forensics in the Cloud. 13. Legal, Privacy, Intellectual Capital Issues in the Cloud. 14. Court Room Preparation and Testimony.

    roduct details

    • Publisher ‏ : ‎ Mercury Learning & Information; Pap/DVD edition (September 15, 2014)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 350 pages
    • ISBN-10 ‏ : ‎ 1938549422
    • ISBN-13 ‏ : ‎ 978-1938549427
    • Item Weight ‏ : ‎ 10.9 ounces
    • Dimensions ‏ : ‎ 0.04 x 7.01 x 9.02 inches
    •  
     
     

    Videos

     
    Read mor
  • Digital forensic process Standard Requirements Kindle Edition

    by Gerardus Blokdyk (Author)

    Does Digital forensic process systematically track and analyze outcomes for accountability and quality improvement? Does Digital forensic process appropriately measure and monitor risk? What are the success criteria that will indicate that Digital forensic process objectives have been met and the benefits delivered? How to Secure Digital forensic process? What are the long-term Digital forensic process goals?

    • ASIN ‏ : ‎ B07CVSYFD3
    • Publisher ‏ : ‎ 5STARCooks (May 3, 2018)
    • Publication date ‏ : ‎ May 3, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 309 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 95 pages
    51zwdtsltql
    51zwdtsltql

    Digital forensic process Standard Requirements Kindle Edition

    by Gerardus Blokdyk (Author)

    Does Digital forensic process systematically track and analyze outcomes for accountability and quality improvement? Does Digital forensic process appropriately measure and monitor risk? What are the success criteria that will indicate that Digital forensic process objectives have been met and the benefits delivered? How to Secure Digital forensic process? What are the long-term Digital forensic process goals?

    • ASIN ‏ : ‎ B07CVSYFD3
    • Publisher ‏ : ‎ 5STARCooks (May 3, 2018)
    • Publication date ‏ : ‎ May 3, 2018
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 309 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 95 pages
  • Computer Forensics and Privacy (Artech House Computer Security Series)

    by Michael A. Caloyannides (Author)
    5.0 5.0 out of 5 stars    1 rating
    See all formats and editions

    • Hardcover
      $25.45 
       
      2 Used from $25.452 New from $36.95
     

    There is a newer edition of this item:

    Privacy Protection and Computer Forensics, Second Edition
    Privacy Protection and Computer Forensics, Second Edition
    $6.88
     (5)
    Only 1 left in stock - order soon.
    Describes the techniques and tools used to find evidence in a personal computer, as well as countermeasures for preventing unauthorized access. The author recommends disk-wiping software to clean up after deleted files, software to enhance on-line security, using a proxy server for on-line anonymity, and buying a second computer solely for Internet connection. Two chapters are devoted to the encryption of both files and entire hard disks. While most of the techniques call for installing software rather than complicated coding, the casual computer user may still find them overwhelming. Annotation c. Book News, Inc., Portland, OR (booknews.com)
    51zvsfx5d2l. sx299 bo1 204 203
    51zvsfx5d2l. sx299 bo1 204 203

    Computer Forensics and Privacy (Artech House Computer Security Series)

    by Michael A. Caloyannides (Author)
    5.0 5.0 out of 5 stars    1 rating
    See all formats and editions

    • Hardcover
      $25.45 
       
      2 Used from $25.452 New from $36.95
     

    There is a newer edition of this item:

    Privacy Protection and Computer Forensics, Second Edition
    Privacy Protection and Computer Forensics, Second Edition
    $6.88
     (5)
    Only 1 left in stock - order soon.
    Describes the techniques and tools used to find evidence in a personal computer, as well as countermeasures for preventing unauthorized access. The author recommends disk-wiping software to clean up after deleted files, software to enhance on-line security, using a proxy server for on-line anonymity, and buying a second computer solely for Internet connection. Two chapters are devoted to the encryption of both files and entire hard disks. While most of the techniques call for installing software rather than complicated coding, the casual computer user may still find them overwhelming. Annotation c. Book News, Inc., Portland, OR (booknews.com)
  • echnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook 1st Edition, Kindle Edition

    by Jack Wiles (Author, Editor)  Format: Kindle Edition
    3.9 3.9 out of 5 stars    2 ratings
    See all formats and editions

    • Kindle
      $62.95
      Read with Our Free App
    •  
    • Paperback
      $37.98 - $66.95 
       
      3 Used from $30.834 New from $39.90
     
    TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
    • Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics
    • Bonus chapters on how to build your own Forensics Lab
    • 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book

    Product details

    • ASIN ‏ : ‎ B008GSGACU
    • Publisher ‏ : ‎ Syngress; 1st edition (October 13, 2011)
    • Publication date ‏ : ‎ October 13, 2011
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 6510 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 430 pages
    •  
    • Customer Reviews: 
      3.9 3.9 out of 5 stars    2 ratings
    https://amzn.to/3oPcAYu
    https://amzn.to/3oPcAYu

    echnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook 1st Edition, Kindle Edition

    by Jack Wiles (Author, Editor)  Format: Kindle Edition
    3.9 3.9 out of 5 stars    2 ratings
    See all formats and editions

    • Kindle
      $62.95
      Read with Our Free App
    •  
    • Paperback
      $37.98 - $66.95 
       
      3 Used from $30.834 New from $39.90
     
    TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
    • Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics
    • Bonus chapters on how to build your own Forensics Lab
    • 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book

    Product details

    • ASIN ‏ : ‎ B008GSGACU
    • Publisher ‏ : ‎ Syngress; 1st edition (October 13, 2011)
    • Publication date ‏ : ‎ October 13, 2011
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 6510 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Not Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Sticky notes ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 430 pages
    •  
    • Customer Reviews: 
      3.9 3.9 out of 5 stars    2 ratings
  • https://amzn.to/42pEVlN

    51ztwsfmp5l. sy346
    51ztwsfmp5l. sy346

    https://amzn.to/42pEVlN

  • The 2018-2023 World Outlook for Digital Forensics Paperback – December 18, 2017

    by Icon Group International (Author)
    See all formats and editions

    • Paperback
      — 
       
     
    This study covers the world outlook for digital forensics across more than 190 countries. For each year reported, estimates are given for the latent demand, or potential industry earnings (P.I.E.), for the country in question (in millions of U.S. dollars), the percent share the country is of the region, and of the globe. These comparative benchmarks allow the reader to quickly gauge a country vis-à-vis others. Using econometric models which project fundamental economic dynamics within each country and across countries, latent demand estimates are created. This report does not discuss the specific players in the market serving the latent demand, nor specific details at the product level. The study also does not consider short-term cyclicalities that might affect realized sales. The study, therefore, is strategic in nature, taking an aggregate and long-run view, irrespective of the players or products involved. This study does not report actual sales data (which are simply unavailable, in a comparable or consistent manner in virtually all of the countries of the world). This study gives, however, my estimates for the worldwide latent demand, or the P.I.E., for digital forensics. It also shows how the P.I.E. is divided across the world's regional and national markets. For each country, I also show my estimates of how the P.I.E. grows over time (positive or negative growth). In order to make these estimates, a multi-stage methodology was employed that is often taught in courses on international strategic planning at graduate schools of business.

    uct details

    • ASIN ‏ : ‎ B06X1B9VM6
    • Publisher ‏ : ‎ ICON Group International, Inc. (December 18, 2017)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 268 pages
    • Item Weight ‏ : ‎ 1.71 pounds
    • Dimensions ‏ : ‎ 8.5 x 0.61 x 11 inch
    Read less
       Repo
    51zsonjfkbl. sx384 bo1 204 203
    51zsonjfkbl. sx384 bo1 204 203

    The 2018-2023 World Outlook for Digital Forensics Paperback – December 18, 2017

    by Icon Group International (Author)
    See all formats and editions

    • Paperback
      — 
       
     
    This study covers the world outlook for digital forensics across more than 190 countries. For each year reported, estimates are given for the latent demand, or potential industry earnings (P.I.E.), for the country in question (in millions of U.S. dollars), the percent share the country is of the region, and of the globe. These comparative benchmarks allow the reader to quickly gauge a country vis-à-vis others. Using econometric models which project fundamental economic dynamics within each country and across countries, latent demand estimates are created. This report does not discuss the specific players in the market serving the latent demand, nor specific details at the product level. The study also does not consider short-term cyclicalities that might affect realized sales. The study, therefore, is strategic in nature, taking an aggregate and long-run view, irrespective of the players or products involved. This study does not report actual sales data (which are simply unavailable, in a comparable or consistent manner in virtually all of the countries of the world). This study gives, however, my estimates for the worldwide latent demand, or the P.I.E., for digital forensics. It also shows how the P.I.E. is divided across the world's regional and national markets. For each country, I also show my estimates of how the P.I.E. grows over time (positive or negative growth). In order to make these estimates, a multi-stage methodology was employed that is often taught in courses on international strategic planning at graduate schools of business.

    uct details

    • ASIN ‏ : ‎ B06X1B9VM6
    • Publisher ‏ : ‎ ICON Group International, Inc. (December 18, 2017)
    • Language ‏ : ‎ English
    • Paperback ‏ : ‎ 268 pages
    • Item Weight ‏ : ‎ 1.71 pounds
    • Dimensions ‏ : ‎ 8.5 x 0.61 x 11 inch
    Read less
       Repo
  • A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Kindle Edition

    by Bruce Schneier (Author)  Format: Kindle Edition
    4.2 4.2 out of 5 stars    192 ratings
     
    3.7 on Goodreads
     
    340 ratings
    Editors' pickBest Nonfiction
    See all formats and editions

    • Kindle
      $9.66
      Earn a $0.97 creditRead with Our Free App
    •  
    • Audible Logo Audiobook
      $0.00
      Free with your Audible trial
    Great on Kindle
    Great Experience. Great Value.
    Enjoy a great reading experience, with a $0.97 credit back to spend on your next Great on Kindle book when you buy the Kindle edition of this book. Learn more about Great on Kindle, available in select categories.
     

    It’s not just computers—hacking is everywhere.



    Legendary cybersecurity expert and 
    New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world.


    A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a series of complex formulas. It has vulnerabilities; we call them “loopholes.” We call exploits “tax avoidance strategies.” And there is an entire industry of “black hat” hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys.


    In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.


    Once you learn how to notice hacks, you’ll start seeing them everywhere—and you’ll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you.


    Unchecked, these hacks threaten to upend our financial markets, weaken our democracy, and even affect the way we think. And when artificial intelligence starts thinking like a hacker—at inhuman speed and scale—the results could be catastrophic.


    But for those who would don the “white hat,” we can understand the hacking mindset and rebuild our economic, political, and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks, and realize a more equitable world.

    Product details

    • ASIN ‏ : ‎ B0B3FY5R3M
    • Publisher ‏ : ‎ W. W. Norton & Company (February 7, 2023)
    • Publication date ‏ : ‎ February 7, 2023
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 3386 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 298 pages
    • Best Sellers Rank: #47,289 in Kindle Store (See Top 100 in Kindle Store)
      • #2 in Social Aspects of the Internet
      • #4 in National & International Security (Kindle Store)
      • #6 in Security & Encryption
    51zrdmhpeel10
    51zrdmhpeel10

    A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Kindle Edition

    by Bruce Schneier (Author)  Format: Kindle Edition
    4.2 4.2 out of 5 stars    192 ratings
     
    3.7 on Goodreads
     
    340 ratings
    Editors' pickBest Nonfiction
    See all formats and editions

    • Kindle
      $9.66
      Earn a $0.97 creditRead with Our Free App
    •  
    • Audible Logo Audiobook
      $0.00
      Free with your Audible trial
    Great on Kindle
    Great Experience. Great Value.
    Enjoy a great reading experience, with a $0.97 credit back to spend on your next Great on Kindle book when you buy the Kindle edition of this book. Learn more about Great on Kindle, available in select categories.
     

    It’s not just computers—hacking is everywhere.



    Legendary cybersecurity expert and 
    New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world.


    A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a series of complex formulas. It has vulnerabilities; we call them “loopholes.” We call exploits “tax avoidance strategies.” And there is an entire industry of “black hat” hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys.


    In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.


    Once you learn how to notice hacks, you’ll start seeing them everywhere—and you’ll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you.


    Unchecked, these hacks threaten to upend our financial markets, weaken our democracy, and even affect the way we think. And when artificial intelligence starts thinking like a hacker—at inhuman speed and scale—the results could be catastrophic.


    But for those who would don the “white hat,” we can understand the hacking mindset and rebuild our economic, political, and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks, and realize a more equitable world.

    Product details

    • ASIN ‏ : ‎ B0B3FY5R3M
    • Publisher ‏ : ‎ W. W. Norton & Company (February 7, 2023)
    • Publication date ‏ : ‎ February 7, 2023
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 3386 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 298 pages
    • Best Sellers Rank: #47,289 in Kindle Store (See Top 100 in Kindle Store)
      • #2 in Social Aspects of the Internet
      • #4 in National & International Security (Kindle Store)
      • #6 in Security & Encryption
  • A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Kindle Edition

    by Bruce Schneier (Author)  Format: Kindle Edition
    4.2 4.2 out of 5 stars    191 ratings
     
    3.7 on Goodreads
     
    335 ratings
    Editors' pickBest Nonfiction
    See all formats and editions

    • Kindle
      $9.66
      Earn a $0.97 creditRead with Our Free App
    •  
    • Audible Logo Audiobook
      $0.00
      Free with your Audible trial
    •  
    • Hardcover
      $20.86 - $26.49 
       
      23 Used from $20.8536 New from $21.11
    •  
    • Paperback
      $19.99 
       
      1 New from $19.99
    Great on Kindle
    Great Experience. Great Value.
    Enjoy a great reading experience, with a $0.97 credit back to spend on your next Great on Kindle book when you buy the Kindle edition of this book. Learn more about Great on Kindle, available in select categories.
     

    It’s not just computers—hacking is everywhere.



    Legendary cybersecurity expert and 
    New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world.


    A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a series of complex formulas. It has vulnerabilities; we call them “loopholes.” We call exploits “tax avoidance strategies.” And there is an entire industry of “black hat” hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys.


    In A Hacker’s Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political, and legal systems to their advantage, at the expense of everyone else.


    Once you learn how to notice hacks, you’ll start seeing them everywhere—and you’ll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you.


    Unchecked, these hacks threaten to upend our financial markets, weaken our democracy, and even affect the way we think. And when artificial intelligence starts thinking like a hacker—at inhuman speed and scale—the results could be catastrophic.


    But for those who would don the “white hat,” we can understand the hacking mindset and rebuild our economic, political, and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks, and realize a more equitable world.

    • ASIN ‏ : ‎ B0B3FY5R3M
    • Publisher ‏ : ‎ W. W. Norton & Company (February 7, 2023)
    • Publication date ‏ : ‎ February 7, 2023
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 3386 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Screen Reader ‏ : ‎ Supported
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Enabled
    • Sticky notes ‏ : ‎ On Kindle Scribe
    • Print length ‏ : ‎ 298 pages
    • Best Sellers Rank: #48,037 in Kindle Store (See Top 100 in Kindle Store)
      • #4 in Social Aspects of the Internet
      • #4 in National & International Security (Kindle Sto
     
    Read more
    51zrdmhpeel
    51zrdmhpeel

    A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Kindle Edition

    by Bruce Schneier (Author)  Format: Kindle Edition
    4.2 4.2 out of 5 stars    191 ratings
     
    3.7 on Goodreads
     
    335 ratings
    Editors' pickBest Nonfiction
    See all formats and editions

    • Kindle
      $9.66
      Earn a $0.97 creditRead with Our Free App
    •  
    • Audible Logo Audiobook
      $0.00
      Free with your Audible trial
    •  
    • Hardcover
      $20.86 - $26.49 
       
      23 Used from $20.8536 New from $21.11
    •  
    • Paperback
      $19.99 
       
      1 New from $19.99
    Great on Kindle
    Great Experience. Great Value.
    Enjoy a great reading experience, with a $0.97 credit back to spend on your next Great on Kindle book when you buy the Kindle edition of this book. Learn more about Great on Kindle, available in select categories.