Networking Communications category: 4555 books

Cover of Tackling Fraud
by alasdair gilchrist
Language: English
Release Date: December 6, 2017

The threat landscape is developing at such a rate that traditional IT security controls can no longer protect us. Legacy IT security mechanisms deal with rules and signatures for known threats coming from the outside. But today the threats are coming from inside. The risks are from malicious employees,...
Cover of Security and Loss Prevention
by Philip Purpura, CPP, Florence Darlington Technical College
Language: English
Release Date: January 18, 2013

The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book’s backbone, and Philip Purpura continues this strong effort with new sidebars and...
Cover of Identity Theft and Fraud

Identity Theft and Fraud

Evaluating and Managing Risk

by Norm Archer, Susan Sproule, Yufei Yuan
Language: English
Release Date: June 30, 2012

Personal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to identity theft and fraud using a risk management approach. It...
Cover of CISSP Study Guide
by Eric Conrad, Seth Misenar, Joshua Feldman
Language: English
Release Date: September 16, 2010

CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP certification. The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The...
Cover of Managing Information Security
by
Language: English
Release Date: March 3, 2010

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability...
Cover of Cisco Router and Switch Forensics

Cisco Router and Switch Forensics

Investigating and Analyzing Malicious Network Activity

by Dale Liu
Language: English
Release Date: June 3, 2009

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack...
Cover of Security+ Boot Camp Study Guide
by Chad Russell
Language: English
Release Date: December 21, 2016

There is a shortfall of over one million information security positions in the global marketplace today. Professionals are in demand and in short supply.The Security+ exam is your ticket to ride in the red hot cyber security industry. Learn about penetration testing, vulnerability scanning...
Cover of Hacking Exposed Linux

Hacking Exposed Linux

Linux Security Secrets and Solutions

by ISECOM
Language: English
Release Date: August 22, 2007

The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides...
Cover of UNIX and Linux Forensic Analysis DVD Toolkit
by Chris Pogue, Cory Altheide, Todd Haverkos
Language: English
Release Date: July 24, 2008

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the...
Cover of Network Forensics

Network Forensics

Tracking Hackers through Cyberspace

by Sherri Davidoff, Jonathan Ham
Language: English
Release Date: June 18, 2012

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal...
Cover of Scene of the Cybercrime
by Debra Littlejohn Shinder, Michael Cross
Language: English
Release Date: July 21, 2008

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the...
Cover of Virtualization for Security

Virtualization for Security

Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

by John Hoopes
Language: English
Release Date: February 24, 2009

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources,...
Cover of Handbook of Digital Forensics and Investigation
by Eoghan Casey, BS, MA
Language: English
Release Date: October 7, 2009

Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an...
Cover of Windows Forensic Analysis Toolkit

Windows Forensic Analysis Toolkit

Advanced Analysis Techniques for Windows 7

by Harlan Carvey
Language: English
Release Date: January 27, 2012

Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 provides an overview of live and postmortem response collection and analysis methodologies for Windows 7. It considers the core investigative and analysis concepts that are critical to the work of professionals within the...
First 81 82 83 84 85 86 8788 89 90 91 92 93 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy