Ultimate DFIR Cheats! X-Ways Forensics FeaturedHot
Books 402
Books
Year published
Oh no! This book is not currently available! But don't worry, after an update, it will be back! ...
Books 312
Books
Year published
As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that...
Books 314
Books
Year published
Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under...
Books 373
Books
Year published
Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud...
Books 373
Books
Year published
In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis,...
Books 326
Books
Year published
First, you’ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts....
SQLite Forensics Hot
Books 417
Books
Year published
SQLite is a self-contained SQL database engine that is used on every smartphone (including all iOS and Android...
Books 320
Books
Year published
he Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A...
Books 310
Books
Year published
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic...
Books 411
Books
Year published
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital...
Books 379
Books
Year published
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital...
Books 430
Books
Year published
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue...
Books 362
Books
Year published
Modern communications are now more than ever heavily dependent on mobile networks, creating the potential for higher incidents of...
Books 400
Books
Year published
Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data...
Books 387
Books
Year published
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to...
Books 357
Books
Year published
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018,...
Books 451
Books
Year published
For courses in computer crime. A complete, easy-to-understand introduction to computer crime Cyber Crime and Cyber Terrorismis a...
Books 383
Books
Year published
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation,...
Books 384
Books
Year published
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With...
Books 420
Books
Year published
Understand malware analysis and its practical implementation Key Features Explore the key concepts...