Catalog Search Results
Author
Pub. Date
[2023]
Language
English
Description
After mounting red flags caused Chris Smith to end a close relationship, he found his digital life under attack: accounts were compromised, emails and texts were intercepted, his social security number was stolen, and his mother's home Wi-Fi router was breached. Chris would soon learn that cybercriminals had targeted him in one of the most extensive, twisted cases of digital identity theft known known to experts. He discovered that he wasn't alone,...
Author
Pub. Date
2023.
Language
English
Description
In this digitally driven era, safeguarding against relentless cyber threats is non-negotiable. This guide will enable you to enhance your skills as a digital forensic examiner by introducing you to cyber challenges that besiege modern entities. It will help you to understand the indispensable role adept digital forensic experts play in preventing these threats and equip you with proactive tools to defend against ever-evolving cyber onslaughts. The...
Author
Pub. Date
[2024]
Language
English
Description
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber intelligence expert Jeffrey Caruso explores the latest developments in cyber espionage and warfare, including the growing role of civilian hackers, the use of social media for nefarious purposes, and the targeting of nonmilitary infrastructure....
Author
Pub. Date
2022.
Language
English
Description
Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in DigitalBusiness:Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience...
Pub. Date
2023.
Language
English
Description
Welcome to the fourth part of our comprehensive course on cybersecurity for beginners. The course begins by exploring browser security and introduces you to two popular browsers, Mozilla Firefox, and Brave Browser. You will delve into the concepts of HTTP and HTTPS protocols, understand the role of cookies in tracking your online activities, and learn how to mitigate their impact on your privacy. Next, you will learn about the significance of Virtual...
Pub. Date
2023.
Language
English
Description
This course is specifically designed to equip both Android and iOS users with practical skills and techniques to safeguard their mobile devices. You will start to distinguish between legitimate applications and malicious programs disguising themselves as genuine apps. App permissions are another critical aspect of mobile device security. You will uncover the truth behind app permissions and discover methods to restrict unnecessary access to your personal...
Author
Pub. Date
[2024]
Language
English
Description
Enhance your skills as a cloud investigator to adeptly respond to cloud incidents by combining traditional forensic techniques with innovative approaches Key Features Uncover the steps involved in cloud forensic investigations for M365 and Google Workspace Explore tools and logs available within AWS, Azure, and Google for cloud investigations Learn how to investigate containerized services such as Kubernetes and Docker Purchase of the print or Kindle...
Author
Pub. Date
[2023]
Language
English
Description
This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it's time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for...
Pub. Date
2021.
Language
English
Description
This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and defense perspectives. Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request