Amazon Price: $59.95 $51.00 You save: $8.95 (15%). (as of December 1, 2015 07:29 –
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.
Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.
. Learn the tools and investigative principles of both physical and digital cybercrime investigations-and how they fit together to build a solid and complete case.
. Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard."
. The only book to combine physical and digital investigative techniques.
The Ethical Hack: A Framework for Business Value Penetration Testing lays out the underlying methodologies and concepts required for performing successful and valuable penetration testing. The author discusses the process of penetration testing from a consultative point of view to ensure that the true value of the test is realized. He supplies a technical perspective of the common tools and exploits used by attackers along with the rational for why they are used and the information they provide the attacker. Finally, the text brings it all together in the form of attack scenarios to show the complete cycle of the attack from the hacker’s perspective to the client’s.
Click here to buy from Amazon
Amazon Price: $60.00 (as of December 1, 2015 08:50 –
This practical guide to penetration testing teaches would-be ethical hackers to scan for, identify, and analyze security vulnerabilitiesâ€•readying readers for the Certified Ethical Hacker (CEH) exam
The Penetration Tester's Handbook: The First Steps to CEH Certification is designed to advance the knowledge, skills, and techniques of the ethical hacker. The book begins with a review of information security theory and goes on to fully cover the tools and techniques of penetration and vulnerability testing. Hands-on exercises are included throughout the handbook to reinforce the information presented and to develop your skills.
Upon finishing this handbook, you will be ready to practice independently to hone your penetration testing skillsâ€•and to work toward obtaining the Certified Ethical Hacker designation. The personal penetration testing lab, for which set-up instructions are included, will aid you beyond the book and serve as a resource for additional practice and study. Bridges the knowledge and experience gap that exists between the CompTIA Security+ certification and the more advanced CEH certification Features more than 30 realistic step-by-step practice exercises