wyszukanych pozycji: 5
Cell Phone Foresnsic Tools: Overview and Analysis
ISBN: 9781470063962 / Angielski / Miękka / 2012 / 190 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
102,40 zł |
Forensic Filtering of Cell Phone Protocols
ISBN: 9781495988042 / Angielski / Miękka / 2008 / 44 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic filter to phone manager protocol exchanges with a device is proposed as a means to reduce risk.
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a pho...
|
|
cena:
71,22 zł |
Guide to General Server Security
ISBN: 9781495989223 / Angielski / Miękka / 2008 / 60 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. This document is intended to assist organizations in installing, configuring, and maintaining secure servers. More specifically, this document describes, in detail, the following practices to apply: * Securing, installing, and configuring the underlying operating system; * Securing, installing, and configuring server software: and * Maintaining the secure configuration through application of appropriate patches and upgrades, security testing, monitoring of logs, and backups of data and operating system files.
This document is intended to assist organizations in installing, configuring, and maintaining secure servers. More specifically, this document describ...
|
|
cena:
43,43 zł |
Guidelines on Active Content and Mobile Code
ISBN: 9781495438738 / Angielski / Miękka / 2008 / 68 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The purpose of this document is to provide an overview of active content and mobile code technologies in use today and offer insights for making informed IT security decisions on their application and treatment. The discussion gives details about the threats, technology risks, and safeguards for end user systems, such as desktops and laptops. Although various end user applications, such as email clients, can involve active content, Web browsers remain the primary vehicle for delivery and are underscored in the discussion. The tenets presented for Web browsers apply equally well to other end...
The purpose of this document is to provide an overview of active content and mobile code technologies in use today and offer insights for making infor...
|
|
cena:
71,22 zł |
Guidelines on Security and Privacy in Public Cloud Computing
ISBN: 9781477621639 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
55,63 zł |