Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey Features……続きを見る
Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Lea……続きを見る
Architect, engineer, integrate, and implement security across increasingly complex, hybrid enterprise networks
Key Features
Learn how to apply industry best practices and earn the CASP+ certificati……続きを見る
How can you use data in a way that protects individual privacy but still provides useful and meaningful analytics? With this practical book, data architects and engineers will learn how to establish……続きを見る
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" vi……続きを見る
著者:Todd Barnum
出版社: O'Reilly Media
発売日: 2021年03月18日
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate securit……続きを見る
著者:Matt Walker
出版社: McGraw Hill LLC
発売日: 2019年03月22日
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Up-to-dat……続きを見る
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forens……続きを見る
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in ……続きを見る
This comprehensive exam guide offers 100% coverage of every topic on the CompTIA PenTest+ exam
Get complete coverage of all the objectives included on the CompTIA PenTest+ certification exam PT0-001……続きを見る
Identity and Access Management is the 5th domain of the CISSP common body of knowledge. Some of the main topics we will cover in this course include: theory and concepts of identity in access manage……続きを見る
If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give yo……続きを見る
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student ……続きを見る
著者:Matt Burrough
出版社: No Starch Press
発売日: 2018年07月31日
A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.
Pentesting A……続きを見る
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques
Key Features
Set up an environment to centralize all data in an Elasticsearch, ……続きを見る
Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall logg……続きを見る
The first edition of Advanced Topics in UNIX was originally published by John Wiley in 1993 when it was named an Alternate Main Selection of the Newbridge Book Club. That book stayed in print for th……続きを見る
Few Information Technology skills are in more demand these days than those related to security and few qualifications in this field are more respected than CompTIA.s Security+ certification. Securit……続きを見る
The purpose of this document is to describe the method by which the security controls will be assessed. In addition, the test methodology, test procedures, and test tools are described to ensure con……続きを見る
In this book, authors Rich Shupe and Zevan Rosser share the knowledge they've gained from their years as multimedia developers/designers and teachers. Learning ActionScript 3.0 gives you a solid fou……続きを見る
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a……続きを見る
Personal health and fitness has joined the digital revolution. Using Microsoft HealthVault, people interested in monitoring their health have an unprecedented opportunity to research their own data.……続きを見る
著者:Ricardo Graça
出版社: RME Comunicação e Idiomas
発売日: 2013年05月26日
"Produzindo Animações com Softwares Livres” é o primeiro livro que trata de produção de animações com softwares livres. Escrito por Ricardo Graça; tem por objetivo apresentar as soluções em so……続きを見る
Enhance the type safety of your code and easily create applications using .Net Generics 4.0Key FeaturesLearn how to use Generics' methods and generic collections to solve complicated problems.Develo……続きを見る
Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizin……続きを見る
The "How to PROTECT your PC" eBook is designed to aid beginner-intermediate level personal computer users to protect and secure their PC's from malicious activity. Computer threats in some cases can……続きを見る
Practical solutions to help you deter, detect, and defend against identity theft
In 2008, 9.9 million Americans became victims of identity theft. The cost exceeded $48 billion in 2008; consumers spe……続きを見る
Linux for Business people is intended as a guide to Linux for Business men and women alike. This book is not aimed at those in the IT Department (though some may find it of use) but instead aims to ……続きを見る
This fully updated bestseller covers the latest web application exploitation techniques and their proven countermeasures Hacking Exposed: Web Applications, Third Edition shows you how to meet the……続きを見る
著者:Lily Thoms
出版社: Axel Publishing
発売日: 2013年04月19日
How To Get Rid of Keyloggers
A keylogger is a device that is installed on your computer and is used to record passwords, keystrokes and other important information. These are the most common tool……続きを見る