Handbook of Digital Forensics and Investigation

Rating: 
Amazon Price: N/A (as of February 22, 2018 05:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime, now in its third edition, providing advanced material from specialists in each area of Digital Forensics.

This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). The Handbook of Digital Forensics and Investigation is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind.
Continue reading “Handbook of Digital Forensics and Investigation”

Chinese Cyber Warfare: China’s Cyber Incursions, Strategic Method, Information Warfare Threat – Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing

Rating: 
Amazon Price: N/A (as of January 28, 2018 04:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's Cyber Incursions: A Theoretical Look at What They See and Why They Do It Based on a Different Strategic Method of Thought – This 2013 paper discusses the strategy behind China's cyber activities. The paper examines the Chinese concept of strategy and how it motivates China's cyber actions. These actions take the form of reconnaissance and system sabotage concepts that result in the fulfillment of strategy and in the development of a preemptive and offensive information deterrence disposition. The paper then examines China's response to the recent Mandiant security firm's report that accused the People's Liberation Army of compliance in attacking 115 US companies since 2006. China's next generation of quantum communications research is briefly discussed as well. The conclusions list the author's opinion regarding how to handle the Chinese in the future, through confrontation or dialogue, based on their thought process. This author argues for interceding into Chinese strategic concepts and changing the objective basis behind their cyber activities. China's invasive cyber activities make perfect sense—to them. Through extensive reconnaissance activities, China gains leverage in three areas: its ability to establish a cyber strategic advantageous posture over potential opponents; its ability to identify key nodes in an opponent's network and gain the potential ability to conduct system sabotage against them if necessary; and its ability to develop a cyber deterrence concept of Chinese-make through the construction of a new type of "show of force," such as the identification and revelation of a potential opponent's cyber geography that deters an opponent from acting. Cyber espionage activities are activated due to a specific strategic thought process and resulting paradigm that subsequently uncovers strategic opportunities.

Chinese Information Warfare: A Phantom Menace or Emerging Threat? Mao Tse-tung counseled, "To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds." Few concepts mesh so contextually with Mao than the Chinese approach to Information Warfare (IW). As the People's Republic of China struggles with its national military strategy, IW offers opportunities to win wars without the traditional clash of arms.
Continue reading “Chinese Cyber Warfare: China's Cyber Incursions, Strategic Method, Information Warfare Threat – Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing”

Cyber Attack

Rating: 
Amazon Price: N/A (as of February 22, 2018 05:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is a thriller, and action packed. It leads the reader through a web of internet intrigue. Many areas of the book give trivia hints to the reader that would allow them to try to reason out the terrorist plot before each plot is finally unravelled and explained by trivia and internet specialists. The book also entails highly trained United States Agents, Secret Anti Subversive Agents known by the acronym SASA, who also enlist the aid of their foreign counterparts, and in some instances enlist the aid of agents that would normally be aggressors and anti U.S. These SASA agents follow and chase the mastermind of the terrorist organization. During their investigations they find themselves in various situations from romance to murder as they pursue the terrorists over several states and other countries.

Cryptocurrency: Cryptocurrency Basics, Bitcoin, Blockchain and Trading Cryptocurrency – How To Buy, Invest, Sell and Store Cryptocurrency

Rating: 
Amazon Price: N/A (as of February 22, 2018 13:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Cryptocurrency Starter Book – Embrace The Future of Digital Currency.

Get a start on this digital currency technology now – it is predicted to change everything in addition to creating massive wealth building opportunities. Everyone should to understand cryptocurrency and how to use it to their benefit as this could change the way business is done
Continue reading “Cryptocurrency: Cryptocurrency Basics, Bitcoin, Blockchain and Trading Cryptocurrency – How To Buy, Invest, Sell and Store Cryptocurrency”

Windows Malware Analysis Essentials

Rating: 
Amazon Price: N/A (as of February 21, 2018 23:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

About This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand how to decipher x86 assembly code from source code inside your favourite development environmentA step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process
Continue reading “Windows Malware Analysis Essentials”