CyberWar

Si Vis Pacem, Para Bellum

By

Digital Forensics with the AccessData Forensic Toolkit (FTK)

Amazon Price: N/A (as of March 22, 2017 12:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Learn how to use AccessData’s Forensic Toolkit (FTK) while mastering the fundamentals of digital forensics
Digital Forensics with the AccessData Forensic Toolkit (FTK) provides a comprehensive review of essential digital forensics concepts and builds on this information to teach you how to conduct digital investigations with AccessData’s FTK—the industry-standard, court-accepted digital investigations platform.
Part I covers the technology all digital forensics investigators need to understand, specifically data, storage media, file systems, and registry files. Part II explains how best to use FTK 5 tools, including FTK imager, FTK registry viewer, and the Password Recovery Toolkit (PRTK), to conduct legally defensible investigations. Written by a digital forensics expert and AccessData instructor Perfect self-study guide for the AccessData Certified Examiner (ACE) exam "Kit Trick" notes highlight best practices for using FTK "Case File" sidebars feature insights from actual digital forensic investigators

By

Incident Response & Computer Forensics, Third Edition

Rating: 
Amazon Price: N/A (as of March 23, 2017 03:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The definitive guide to incident response–updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind–and remediation strategies for–today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans

By

Principles of Computer Security Lab Manual, Fourth Edition

Rating: 
Amazon Price: $52.00 (as of March 22, 2017 16:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary
In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response

By

Computer Forensics InfoSec Pro Guide

Rating: 
Amazon Price: N/A (as of March 23, 2017 02:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.
Read More

By

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Amazon Price: $60.00 $46.46 You save: $13.54 (23%). (as of March 22, 2017 09:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware
Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail. Counter today’s most virulent network attack types Find out how malware infects, survives, and propagates across an enterprise Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Learn how hackers use archivers, encryptors, and packers to obfuscate code Defend against keylogging, redirect, click fraud, and identity theft threats

/* */