Amazon Price: N/A (as of February 22, 2018 17:46 –
Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.
Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.
Continue reading “Google Hacks: Tips & Tools for Finding and Using the World's Information”
Amazon Price: $129.00 $95.08 You save: $33.92 (26%). (as of February 22, 2018 15:05 –
EW 101 has been a popular column in the Journal of Electronic Defense for a number of years. This compilation of tutorial articles from JED provides introductory level electronic warfare instruction for students of the discipline.
Amazon Price: $39.95 (as of February 22, 2018 18:26 –
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time.
Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
Dives deeply into relevant technical and factual information from an insider's point of view
Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Amazon Price: $49.95 $40.67 You save: $9.28 (19%). (as of February 21, 2018 18:42 –
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.
Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.
Continue reading “Practical Forensic Imaging: Securing Digital Evidence with Linux Tools”