How to Investigate Like a Rockstar

Hacking the Planet

Nonfiction, Computers, Internet, Security, Application Software, Computer Security
Cover of the book How to Investigate Like a Rockstar by sparc Flow, sparc Flow
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: sparc Flow ISBN: 9781386926276
Publisher: sparc Flow Publication: August 14, 2017
Imprint: Language: English
Author: sparc Flow
ISBN: 9781386926276
Publisher: sparc Flow
Publication: August 14, 2017
Imprint:
Language: English

"There are two kinds of companies: those that have been breached and those that do not know it yet."

The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers.

Digital Forensics
We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management.

Rebuilding systems
Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached.

For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

"There are two kinds of companies: those that have been breached and those that do not know it yet."

The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers.

Digital Forensics
We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management.

Rebuilding systems
Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached.

For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!

More books from Computer Security

Cover of the book The Hacker's Guide to OS X by sparc Flow
Cover of the book Wireless Mobile Internet Security by sparc Flow
Cover of the book Consumer Guide to Computer Security: Fight Back Against Identity Theft, Malware, Hackers, Spyware, Spam, Botnets, Phishing - Online Privacy - Wireless, Laptop, Hotspot Security by sparc Flow
Cover of the book Secure System Design and Trustable Computing by sparc Flow
Cover of the book Cloud Memoirs: Views from Below, Inside, and Above by sparc Flow
Cover of the book Surviving Modern Technology: Understanding Safety and Privacy by sparc Flow
Cover of the book The Basics of Web Hacking by sparc Flow
Cover of the book HCISPP Study Guide by sparc Flow
Cover of the book Digital Forensics and Cyber Crime by sparc Flow
Cover of the book Crisis and Escalation in Cyberspace by sparc Flow
Cover of the book Python per hacker by sparc Flow
Cover of the book Principles of Security and Trust by sparc Flow
Cover of the book Customizing Chef by sparc Flow
Cover of the book Your Amazing Itty Bitty® Personal Data Protection Book by sparc Flow
Cover of the book The Rise of Global Free Speech in the Digital Age by sparc Flow
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy