CyberWar

Si Vis Pacem, Para Bellum

By

Digital Forensics with the AccessData Forensic Toolkit (FTK)

Amazon Price: N/A (as of April 26, 2017 19:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Learn how to use AccessData’s Forensic Toolkit (FTK) while mastering the fundamentals of digital forensics
Digital Forensics with the AccessData Forensic Toolkit (FTK) provides a comprehensive review of essential digital forensics concepts and builds on this information to teach you how to conduct digital investigations with AccessData’s FTK—the industry-standard, court-accepted digital investigations platform.
Part I covers the technology all digital forensics investigators need to understand, specifically data, storage media, file systems, and registry files. Part II explains how best to use FTK 5 tools, including FTK imager, FTK registry viewer, and the Password Recovery Toolkit (PRTK), to conduct legally defensible investigations. Written by a digital forensics expert and AccessData instructor Perfect self-study guide for the AccessData Certified Examiner (ACE) exam "Kit Trick" notes highlight best practices for using FTK "Case File" sidebars feature insights from actual digital forensic investigators

By

Cyber Resilience Best Practices

Amazon Price: $170.00 $117.57 You save: $52.43 (31%). (as of April 26, 2017 14:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber Resilience Best Practices provides organizations with a methodology for implementing cyber resilience. It offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.

Key Features
Read More

By

How to Build a Beowulf: A Guide to the Implementation and Application of PC Clusters (Scientific and Engineering Computation)

Rating: 
Amazon Price: N/A (as of April 26, 2017 10:02 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Supercomputing research–the goal of which is to make computers that are
ever faster and more powerful–has been at the cutting edge of computer technology
since the early 1960s. Until recently, research cost in the millions of dollars, and
many of the companies that originally made supercomputers are now out of
business.The early supercomputers used distributed computing and parallel processing
to link processors together in a single machine, often called a mainframe.
Exploiting the same technology, researchers are now using off-the-shelf PCs to
produce computers with supercomputer performance. It is now possible to make a
supercomputer for less than $40,000. Given this new affordability, a number of
universities and research laboratories are experimenting with installing such
Beowulf-type systems in their facilities.This how-to guide provides step-by-step
instructions for building a Beowulf-type computer, including the physical elements
that make up a clustered PC computing system, the software required (most of which
is freely available), and insights on how to organize the code to exploit
parallelism. The book also includes a list of potential pitfalls.

By

Macintosh Terminal Pocket Guide

Rating: 
Amazon Price: N/A (as of April 27, 2017 07:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Unlock the secrets of the Terminal and discover how this powerful tool solves problems the Finder can’t handle. With this handy guide, you’ll learn commands for a variety of tasks, such as killing programs that refuse to quit, renaming a large batch of files in seconds, or running jobs in the background while you do other work.

Get started with an easy-to-understand overview of the Terminal and its partner, the shell. Then dive into commands neatly arranged into two dozen categories, including directory operations, file comparisons, and network connections. Each command includes a concise description of its purpose and features.Log into your Mac from remote locationsSearch and modify files in powerful waysSchedule jobs for particular days and timesLet several people use one Mac at the same timeCompress and uncompress files in a variety of formatsView and manipulate Mac OS X processesCombine multiple commands to perform complex operationsDownload and install additional commands from the Internet

By

BIT WARS: Hacking Report: Top Hacks and Attacks of 2014 (Volume 1)

Rating: 
Amazon Price: $3.99 $3.99 (as of April 26, 2017 18:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In BIT WARS: Hacking Report: Top Hacks and Attacks of 2014, Thomas Hyslip presents the who, what, when, where, why, and how, of the top hacks of 2014. 2014 was a year to be remembered in hacking. Sony was attacked by North Korea, Six Chinese military officers were indicted for hacking US companies, and the Point of Sale Malware attacks continued to compromise million of credit and debit cards. With no end in sight, BIT WARS provides a concise overview of the years top hacks and attacks.

/* */