Windows Forensic Analysis Toolkit, Fourth Edition: Advanced Analysis Techniques for Windows 8

Rating: 
Amazon Price: $69.95 $57.78 You save: $12.17 (17%). (as of November 20, 2017 21:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how.
The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7.
This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting. Complete coverage and examples of Windows 8 systems Contains lessons from the field, case studies, and war stories Companion online toolkit material, including electronic printable checklists, cheat sheets, custom tools, and walk-throughs

WHATSAPP & INDIAN CYBERLAW

Amazon Price: N/A (as of November 21, 2017 08:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

WHATSAPP & INDIAN CYBERLAW

India is already undergoing a huge mobile revolution. The numbers of smartphones that are continuing to be sold in India are an indication of the growing dependence on smartphones by Indians. Consequently, Indians are using various mobile applications. WhatsApp is one of the most popular mobile applications in India. Primarily because WhatsApp is free, it appeals to large number of Indian users who find the said platform very convenient for the purposes of communicating audio, video, image and text. However, the usage of WhatsApp has got distinct legal ramifications in India, thanks to the Indian Cyberlaw being in place.
Continue reading “WHATSAPP & INDIAN CYBERLAW”

Finance: Cloud Computing, Cyber Security and Cyber Heist – Beginners Guide to Help Protect Against Online Theft in the Cyber World

Rating: 
Amazon Price: N/A (as of November 20, 2017 15:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Finance: Cloud Computing, Cyber Security and Cyber Heist – Beginners Guide to Help Protect Against Online Theft in the Cyber World

***Please Note: This is a Guide to Help Protect against Online Theft in the Cyber World – For Beginners***
Continue reading “Finance: Cloud Computing, Cyber Security and Cyber Heist – Beginners Guide to Help Protect Against Online Theft in the Cyber World”

SOCIAL MEDIA & MOBILE LAW – SOME EMERGING CHALLENGES

Amazon Price: N/A (as of November 21, 2017 02:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

SOCIAL MEDIA & MOBILE LAW – SOME EMERGING CHALLENGES

Today, mobile has been a game changer in our day-to-day lives. It has not only changed the way how we communicate with each other but more significantly has provided us the mobile platform for accessing social media, while being on the go. Consequently, various social media platforms and networks have consistently targeted mobile users. It is common knowledge that the mobile users of social media are constantly growing. It is therefore but natural to expect that social media platforms are now increasingly providing mobile applications for the purposes of accessing social media.
Continue reading “SOCIAL MEDIA & MOBILE LAW – SOME EMERGING CHALLENGES”

Information Security and Cyber Laws

Amazon Price: $18.00 (as of November 20, 2017 11:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The world of communication has been making rapid strides. Information Technology has made this world smaller and more accessible. Perhaps the biggest and the most signifi cant change in IT is the advent of the Internet—with it, transferring information, even across continents and oceans, has become easy and instantaneous. Given the changing scenario, security of information has become an important and inseparable aspect of communication. When the message is received only by the intended recipient, the information is said to have been secure. But, if the information passes through the hands of other people before reaching the intended recipient, the security of the information is considered to have been breached. Information security is essential from both, the online and offl ine points-of-view. Information may be in the form of documents and CDs, stored in databases, or in hard disks. This book deals with the concept of information security, the various measures and counter-measures which one needs to take to make the information systems secure and the laws which govern the concept. Structure of the Book This book is divided into 8 chapters, sequenced to give a better understanding of the concepts. Each chapter contains Learning Objectives, Summary, and Solved and Unsolved Questions to aid comprehension of the concepts. The Glossary at the end of the book adds value to the learning. The last two chapters dealing with Cyber Security and Cyber Laws are accompanied by an appendix each. Important topics and concepts have been covered in great detail in the book—including, but not limited to—access control measures, threats, physical security, intrusion detection, cyber security and cyber crime. The 8 chapters together cover the entire syllabus of GBTU’s Information Security and Cyber Laws paper of the BTech course, making the book a student’s ideal companion. I hope that the readers are benefi ted from my effort in bringing out this book. I sincerely thank Vikas Publishing House for their help in giving the book its fi nal shape. Comments and suggestions from the readers are welcome.