| |
Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the...
Editeur :
Elsevier
Parution :
2014-05-16
PDF sans DRM
|
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and...
Editeur :
Syngress
Parution :
2014-04-18
PDF, epub sans DRM
|
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical...
Editeur :
Syngress
Parution :
2014-04-07
epub sans DRM
|
The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method.The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the...
Editeur :
Morgan Kaufmann
Parution :
2014-03-21
epub sans DRM
|
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file...
Editeur :
Syngress
Parution :
2014-03-11
epub sans DRM
|
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...
Editeur :
Wiley-ISTE
Parution :
2014-02-19
PDF, ePub
|
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...
Editeur :
Wiley
Parution :
2014-02-12
PDF, ePub
|
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...
Editeur :
Wiley
Parution :
2014-02-03
PDF, ePub
|
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...
Editeur :
Wiley
Parution :
2014-01-27
PDF, ePub
|
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data...
Editeur :
Wiley
Parution :
2014-01-24
PDF, ePub
|
The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative...
Editeur :
Butterworth-Heinemann
Parution :
2013-12-27
epub sans DRM
|
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through...
Editeur :
Syngress
Parution :
2013-12-05
epub sans DRM
|
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.
Network security monitoring is...
Editeur :
Syngress
Parution :
2013-11-26
epub sans DRM
|
Much of the work of user-centered design practitioners involves some type of interviewing. While interviewing is an important skill, many colleagues have little or no formal training in interviewing methods and often learn on the job with limited feedback on the quality...
Editeur :
Morgan Kaufmann
Parution :
2013-11-23
epub sans DRM
|
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...
Editeur :
Wiley
Parution :
2013-11-20
PDF, ePub
|
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide...
Editeur :
Syngress
Parution :
2013-11-19
ePub, PDF sans DRM
|
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in...
Editeur :
Syngress
Parution :
2013-11-16
epub sans DRM
|
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear...
Editeur :
Syngress
Parution :
2013-11-12
epub sans DRM
|
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for...
Editeur :
Syngress
Parution :
2013-11-12
epub sans DRM
|
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need...
Editeur :
Syngress
Parution :
2013-11-08
epub sans DRM
|