-
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Forensics For Dummies, 2nd Edition
Author Douglas P. Lyle
Forensics For Dummies (9781119608967) was previously published as Forensics For Dummies (9781119181651). While this version features a new Dummies cover and design, the content is the same as the prior release and should not be considered a new or updated product. ....
Release Date 2019/06 -
Author Nipun Jaswal
Gain basic skills in network forensics and learn how to apply them effectively Key FeaturesInvestigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network levelB....
Release Date 2019/03 -
Author Giulio D'Agostino
Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world.The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some....
Release Date 2019/02 -
Author Ric Messier
Intensively hands-on training for real-world network forensicsNetwork Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissecting packets, y....
Release Date 2017/08 -
System Forensics, Investigation, and Response, 3rd Edition
Author Chuck Easttom
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of syste....
Release Date 2017/08 -
Author Samir Datt
Identify and safeguard your network against both internal and external threats, hackers, and malware attacksAbout This BookLay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network trafficConnect th....
Release Date 2016/02 -
Learning Network Programming with Java
Author Richard M Reese
Harness the hidden power of Java to build network-enabled applications with lower network traffic and faster processesAbout This BookLearn to deliver superior server-to-server communication through the networking channelsGain expertise of the networking features of....
Release Date 2015/12 -
Author Jayson E Street
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the worl....
Release Date 2015/07 -
Network Forensics: Tracking Hackers through Cyberspace
Author Jonathan Ham , Sherri Davidoff
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadm....
Release Date 2012/06 -
Mastering Windows Network Forensics and Investigation, 2nd Edition
Author Scott Pearson , Ryan Johnson , Steve Bunting , Steven Anson
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personn....
Release Date 2012/06 -
System Forensics, Investigation, and Response
Author K Rudolph , John R. Vacca
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begins by examining....
Release Date 2010/09 -
Dealing with a Lay Off: What to Expect When You Are No Longer Expected
Author Martha I. Finney
This Element is an excerpt from Rebound: A Proven Plan for Starting Over After Job Loss (ISBN: 9780137021147) by Martha Finney. Available in print and digital formats.Get your head and heart together after you’re laid off: what you’ll feel and how to handle it.You’v....
Release Date 2010/02 -
Scene of the Cybercrime, 2nd Edition
Author Michael Cross , Debra Littlejohn Shinder
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the firs....
Release Date 2008/07 -
Author Brian T Contos
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist thre....
Release Date 2006/10 -
Author Lance Spitzner
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute"One of the great byproducts of Lance's work with honeypots and honeynets is that he....
Release Date 2002/09 -
Author Eric Cole
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are ver....
Release Date 2001/08