Tableau's Forensic FireWire Bridge offers secure, hardware write-blocking for FireWire storage devices. The T9 supports FireWire800 (1394B) and FireWire400 (1394A) storage devices which use the SBP-2 (Serial Bus Protocol-2) storage protocol. The T9 works universally with external FireWire hard disks, FireWire RAIDs, older Apple iPods with FireWire interfaces, and other FireWire storage devices.
Key FeaturesA hands-on guide to web scraping using Python with solutions to real-world problemsCreate a number of different web scrapers in Python to extract informationThis book includes practical examples on using the popular and well-maintained libraries in Python for your web scraping needs
Continue reading “Python Web Scraping – Second Edition”
Follow-up to the New York Times bestseller Spy Secrets That Can Save Your Life–revealing high-stakes techniques and survival secrets from real intelligence officers in life-or-death situations around the world
Everyone loves a good spy story, but most of the ones we hear are fictional. That's because the most dangerous and important spycraft is done in secret, often hidden in plain sight.
Continue reading “Survive Like a Spy: Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too”
DNS is one of the oldest protocols on the Internet, and was designed for a network without hostile users. Anyone who wants to break into a network starts by investigating the target's Domain Name Service. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. But learning DNSSEC requires wading through years of obsolete tutorials, dead ends, and inscrutable standards.
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.
Continue reading “Stealing the Network: How to Own a Shadow”