Amazon Price: N/A (as of June 24, 2017 22:06 –
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”
– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.
Continue reading “Network Forensics: Tracking Hackers through Cyberspace”
Amazon Price: $30.00 $29.94 You save: $0.06 (%). (as of June 24, 2017 21:54 –
“Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency” is one of the few books that covers destructive Computer Network Attacks in the Internet and in CyberSpace. It is an in-depth reference that covers DDOS from motivation, identification, analysis and mitigation.
By the author of the consistently top-selling in class "How to Cheat at Managing Information Security" and like that book, proceeds go to charity. Osborne starts with Network/Internet provider business practices and existing monitoring & detection systems. It shows the current focus on other forms of attacks including traditional electronic espionage, counter-terrorism and malware. It then describes various mechanisms for estimation of Cyberattack impact covering direct cost, indirect cost, and customer churn.
Continue reading “Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency: Is Hollywood's blueprint for Chaos coming true”
Amazon Price: N/A (as of June 24, 2017 09:23 –
Essential reading for launching a career in computer forensics
Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crimeDetails the ways to conduct a computer forensics investigationHighlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witnessWalks you through identifying, collecting, and preserving computer evidenceExplains how to understand encryption and examine encryption files
Continue reading “Computer Forensics JumpStart”
Amazon Price: N/A (as of June 24, 2017 17:21 –
The Global Internet in a Nutshell begins with a review of the history, technology, and competing theories of the Internet that enables a deeper understanding of case law and statutory developments discussed in the substantive chapters. It briefly covers the history of the Internet through the rapidly evolving Web 3.0, competing theories of Internet governance, cyber jurisdiction and enforcement of judgments, choice and conflicts of law, cybertorts, online contracting and licensing, the protection of online intellectual property assets, the protection of online privacy, criminal liability for Internet activity, and European Community directives such as the E-Commerce Directive, Brussels Regulation, and Rome I Regulation. The second edition presents a comprehensive review of cybertort and cybercrime developments including foreign cases. Each chapter of this revised edition reviews statutory and caselaw developments from the European Union as well as other foreign countries.
Amazon Price: N/A (as of June 24, 2017 18:11 –
“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.”
–Nate Miller, Cofounder, Stratum Security
Continue reading “Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century”