Catalog Search Results
Author
Pub. Date
©2014
Language
English
Description
This book reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. It illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide. You will learn how to: install EnCase Forensic...
42) Origami man
Author
Series
Gibson Vaughn novels volume 5
Pub. Date
[2020]
Language
English
Description
"Former Marine, brilliant hacker, and wanted fugitive Gibson Vaughn is off the grid in the Caymans. Until the ice-cold assassin Tinsley draws him out of the shadows. Complying with the man who murdered his father and left Gibson for dead? In the war against terror, never say never. Especially when half a million lives are at stake. Tinsley's in possession of a heavily encrypted thumb drive. But the details of the plot--the motive, the targets, and...
Author
Pub. Date
2023
Language
English
Description
Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threats Key Features Get up to speed with the ins and outs of cybercriminal activity on the dark web Become familiar with the tools and techniques that are used to fight serious crime Gain a keen understanding of the crime ecosystem on the dark web and the best practices...
44) Version zero
Author
Pub. Date
[2021]
Language
English
Appears on list
Description
"Max, a data whiz at the social media company Wren, has gotten a firsthand glimpse of the dark side of big tech. When he questions what his company does with the data they collect, he's fired...then black-balled across Silicon Valley. With time on his hands and revenge on his mind, Max and his longtime friend (and secretly the love of his life) Akiko, decide to get even by rebooting the internet. After all, in order to fix things, sometimes you have...
Pub. Date
2022.
Language
English
Description
With the expansion of the remote workforce, more than ever security professionals need to know exactly who is logging into critical systems and accessing role-appropriate data. Enter zero trust--a network security model based on a strict identity verification process. Join us to get up to speed with key techniques and best practices for the zero-trust model and gain expert advice on emerging guidelines and standards and how to successfully deploy...
Author
Pub. Date
2016.
Language
English
Description
"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only...
48) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Series
Pub. Date
©2008
Language
English
Description
"Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. Plus, Computer Forensics for Dummies...
Author
Pub. Date
2010.
Language
English
Description
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required...
Author
Pub. Date
[2022]
Language
English
Description
Ransomware has become a global scourge, as gangs of cybercriminals use malware to encrypt victims' data and extort payment as a condition of restoring access. The majority of business leaders who fall prey to the tactic are unprepared for the scenario and wind up paying the ransom. The authors suggest a more considered approach to that decision and walk readers through six questions that can illuminate their options and inform their choices.
Author
Language
English
Formats
Description
Explores "the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies--and countless viruses, phishing, and spyware attacks--he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere"--Amazon.com.
Author
Pub. Date
©2007
Language
English
Description
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking. The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions,...
Author
Pub. Date
2021.
Language
English
Description
This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices,...
Author
Series
Language
English
Formats
Description
The fact that so much of our lives are online erodes our privacy. This has dangerous consequences; for kids it can even lead to being targeted by online predators. This book teaches readers how they can protect their privacy online. It explains what to do if contacted by a predator and reminds kids singled out by predators that it was not their fault.
Author
Pub. Date
©2010
Language
English
Description
"Digital Triage Forensics (DTF) is a procedural model for the investigation of Digital Crime Scenes including both Traditional Crime Scenes and the more complex Battlefield Crime Scenes. The United States Army and other traditional Police agencies use this model for current Digital Forensic Applications. The tool, training, and techniques from this practice are being brought to the public in this book for the first time. Now Corporations, Law Enforcement,...
Author
Series
Language
English
Formats
Description
"Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer...
Author
Pub. Date
©2007
Language
English
Description
CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has just begun to blossom. CD and DVD Forensics is a how to book that will give the reader tools to be able...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request