Amazon Price: N/A (as of April 26, 2017 19:50 –
Learn how to use AccessData’s Forensic Toolkit (FTK) while mastering the fundamentals of digital forensics
Digital Forensics with the AccessData Forensic Toolkit (FTK) provides a comprehensive review of essential digital forensics concepts and builds on this information to teach you how to conduct digital investigations with AccessData’s FTK—the industry-standard, court-accepted digital investigations platform.
Part I covers the technology all digital forensics investigators need to understand, specifically data, storage media, file systems, and registry files. Part II explains how best to use FTK 5 tools, including FTK imager, FTK registry viewer, and the Password Recovery Toolkit (PRTK), to conduct legally defensible investigations. Written by a digital forensics expert and AccessData instructor Perfect self-study guide for the AccessData Certified Examiner (ACE) exam "Kit Trick" notes highlight best practices for using FTK "Case File" sidebars feature insights from actual digital forensic investigators
Amazon Price: $170.00 $117.57 You save: $52.43 (31%). (as of April 26, 2017 14:34 –
Cyber Resilience Best Practices provides organizations with a methodology for implementing cyber resilience. It offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.
Amazon Price: N/A (as of April 26, 2017 10:02 –
Supercomputing research–the goal of which is to make computers that are
ever faster and more powerful–has been at the cutting edge of computer technology
since the early 1960s. Until recently, research cost in the millions of dollars, and
many of the companies that originally made supercomputers are now out of
business.The early supercomputers used distributed computing and parallel processing
to link processors together in a single machine, often called a mainframe.
Exploiting the same technology, researchers are now using off-the-shelf PCs to
produce computers with supercomputer performance. It is now possible to make a
supercomputer for less than $40,000. Given this new affordability, a number of
universities and research laboratories are experimenting with installing such
Beowulf-type systems in their facilities.This how-to guide provides step-by-step
instructions for building a Beowulf-type computer, including the physical elements
that make up a clustered PC computing system, the software required (most of which
is freely available), and insights on how to organize the code to exploit
parallelism. The book also includes a list of potential pitfalls.
Amazon Price: $3.99 $3.99 (as of April 26, 2017 18:58 –
In BIT WARS: Hacking Report: Top Hacks and Attacks of 2014, Thomas Hyslip presents the who, what, when, where, why, and how, of the top hacks of 2014. 2014 was a year to be remembered in hacking. Sony was attacked by North Korea, Six Chinese military officers were indicted for hacking US companies, and the Point of Sale Malware attacks continued to compromise million of credit and debit cards. With no end in sight, BIT WARS provides a concise overview of the years top hacks and attacks.