![]() |
Computer Forensics and Digital Investigation with EnCase Forensic v7
ISBN: 9780071807913 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Conduct repeatable, defensible investigations with EnCase Forensic v7
Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample... Conduct repeatable, defensible investigations with EnCase Forensic v7
Maximize the powerful tools and features of the industry-leading digital inve... |
cena:
234,42 |
![]() |
Hacking Exposed Mobile: Security Secrets & Solutions
ISBN: 9780071817011 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior... Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The autho... |
cena:
234,42 |
![]() |
Practical Anonymity: Hiding in Plain Sight Online
ISBN: 9780124104044 / Angielski / Miękka / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be... For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activis... |
cena:
102,18 |
![]() |
From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line
ISBN: 9780124115941 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. Having transitioned into the private sector from a long career in public service with the DEA, Quilter offers valuable perspective on the differences in culture and priorities between the public and private sectors, and how those differences can affect efforts in organizational security. Readers will benefit from the author's insights on researching and joining a new organization, exploring a business' structure and culture, and getting to know... In From One Winning Career to the Next, author J. David Quilter expertly guides the security professional through the corporate landscape. H... |
cena:
126,51 |
![]() |
Business Continuity: Playbook
ISBN: 9780124116481 / Angielski / Miękka / 98 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization's business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after a crisis. This playbook guides the security leader through the development, implementation, and maintenance of a successful BCP. The text begins with a detailed description of the concept and value of business continuity planning,... The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization's business c... |
cena:
194,66 |
![]() |
Radius: Securing Public Access to Private Resources
ISBN: 9780596003227 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. Originally developed for dial-up remote access, RADIUS is now used by virtual private network (VPN) servers, wireless access points, authenticating Ethernet switches,... The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to anot... |
cena:
136,25 |
![]() |
Advances in Cyber Security: Technology, Operations, and Experiences
ISBN: 9780823244577 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge...
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. ...
|
cena:
107,05 |
![]() |
E-Discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support
ISBN: 9781597492966 / Angielski / Miękka / 302 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2 billion industry, a 60% increase from 2004, projected to double by 2009. The core reason for the explosion of e-discovery is sheer volume; evidence is digital and 75% of modern day lawsuits entail e-discovery. A recent survey reports that U.S. companies face an average of 305 pending lawsuits...
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respo...
|
cena:
277,42 |
![]() |
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
ISBN: 9781597493055 / Angielski / Miękka / 357 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of...
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice...
|
cena:
214,14 |
![]() |
Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
ISBN: 9781615208319 / Angielski / Twarda / 514 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of...
In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical system...
|
cena:
917,20 |
![]() |
E-Safety for the i-Generation: Combating the Misuse and Abuse of Technology in Schools
ISBN: 9781849059442 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How can you protect young people from the dangers of the internet, now that they are living increasingly hidden lives online? Cyber bullying, sexual harassment, cyber stalking - these are all risks that young people may face every day, and effective e-safety is more important than ever. This practical, hands-on resource will help you understand issues such as cyber bullying and sexual dangers online, what e-safety is, how to adopt a whole school approach to e-safety, how to involve parents and carers in e-safety, and responding to incidents. It also covers how to implement an e-safety policy,...
How can you protect young people from the dangers of the internet, now that they are living increasingly hidden lives online? Cyber bullying, sexual h...
|
cena:
128,05 |
![]() |
Net Neutrality: Towards a Co-Regulatory Solution
ISBN: 9781849660068 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user's ISP (or another ISP) blocks that access in part or whole. The suggestion has been that the problem can be resolved by either introducing greater competition, or closely policing conditions for vertically integrated service, such as VOIP. However, that is not the whole story, and ISPs, as a whole, have incentives to discriminate between content for matters such as network management of spam, to secure... Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discr... |
cena:
535,46 |
![]() |
Microsoft System Center 2012 Endpoint Protection Cookbook
ISBN: 9781849683906 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems against threats with leading malware detection technologies. Built on Configuration Manager, it provides a unified infrastructure for client security and compliance management and "Microsoft System Center 2012 Endpoint Protection Cookbook" will help you get to grips with vital tasks for implementing this security tool. With the release of System Center 2012 Endpoint Protection, Microsoft is continuing its commitment to offering a cutting edge,...
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems...
|
cena:
210,86 |
![]() |
Microsoft Forefront Identity Manager 2010 R2 Handbook
ISBN: 9781849685368 / Angielski / Miękka / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems. The "Microsoft Forefront Identity Manager 2010 R2 Handbook" is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting. Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for...
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastru...
|
cena:
262,51 |
![]() |
Cloud Computing Protected: Security Assessment Handbook
ISBN: 9780956355621 / Angielski / Miękka / 391 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Cloud Computing Protected" describes the most important security challenges that organizations face by adopting public cloud services and implementing cloud-based infrastructure.
"Cloud Computing Protected" describes the most important security challenges that organizations face by adopting public cloud services and implementin...
|
cena:
153,53 |
![]() |
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk
ISBN: 9780124200562 / Angielski / Miękka / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical,... Scientists with little or no background in security and security professionals with little or no background in science and technology often have di... |
cena:
233,60 |
![]() |
The Nsa Report: Liberty and Security in a Changing World
ISBN: 9780691163208 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA... "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will de... |
cena:
72,96 |
![]() |
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
ISBN: 9781627054775 / Angielski / Miękka / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. I argue that we can resolve the tension between security and features by leveraging the...
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections f...
|
cena:
253,12 |
![]() |
Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
ISBN: 9781491913710 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings, an investigative look into the shady world of email spammers and the people trying to stop them. This compelling expose explores the shadowy world of the people responsible for today's junk-email epidemic. Investigative journalist Brian McWilliams delivers a fascinating account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and anti-spam activists. McWilliams chronicles the activities of several... "People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings |
cena:
96,03 |
![]() |
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
ISBN: 9781250060860 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
|
cena:
92,19 |