|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
With the rapid advancement in technology, a myriad of new threats
have emerged in online environments. The broad spectrum of these
digital risks requires new and innovative methods for protection
against cybercrimes. Combating Security Breaches and Criminal
Activity in the Digital Sphere is a pivotal reference source for
the latest scholarly research on current trends in cyber forensic
investigations, focusing on advanced techniques for protecting
information security and preventing potential exploitation for
online users. Featuring law enforcement perspectives, theoretical
foundations, and forensic methods, this book is ideally designed
for policy makers, analysts, researchers, technology developers,
and upper-level students.
"Malware Forensics: Investigating and Analyzing Malicious Code"
covers the emerging and evolving field of "live forensics," where
investigators examine a computer system to collect and preserve
critical live data that may be lost if the system is shut down.
Unlike other forensic texts that discuss "live forensics" on a
particular operating system, or in a generic context, this book
emphasizes a live forensics and evidence collection methodology on
both Windows and Linux operating systems in the context of
identifying and capturing malicious code and evidence of its effect
on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code"
also devotes extensive coverage of the burgeoning forensic field of
physical and process memory analysis on both Windows and Linux
platforms. This book provides clear and concise guidance as to how
to forensically capture and examine physical and process memory as
a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code,
accounted for its evolutionary history, and in some instances,
dedicated a mere chapter or two to analyzing malicious code.
Conversely, "Malware Forensics: Investigating and Analyzing
Malicious Code" emphasizes the practical "how-to" aspect of
malicious code investigation, giving deep coverage on the tools and
techniques of conducting runtime behavioral malware analysis (such
as file, registry, network and port monitoring) and static code
analysis (such as file identification and profiling, strings
discovery, armoring/packing detection, disassembling, debugging),
and more.
* Winner of Best Book Bejtlich read in 2008
* http:
//taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases,
which allows them to provide unparalleled insight to the
reader.
* First book to detail how to perform "live forensic" techniques on
malicous code.
* In addition to the technical topics discussed, this book also
offers critical legal considerations addressing the legal
ramifications and requirements governing the subject matter
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital
tool in the arsenal of today's computer programmers, students, and
investigators. As computer networks become ubiquitous throughout
the world, cyber crime, cyber terrorism, and cyber war have become
some of the most concerning topics in today's security landscape.
News stories about Stuxnet and PRISM have brought these activities
into the public eye, and serve to show just how effective,
controversial, and worrying these tactics can become. Cyber Crime
and Cyber Terrorism Investigator's Handbook describes and analyzes
many of the motivations, tools, and tactics behind cyber attacks
and the defenses against them. With this book, you will learn about
the technological and logistic framework of cyber crime, as well as
the social and legal backgrounds of its prosecution and
investigation. Whether you are a law enforcement professional, an
IT specialist, a researcher, or a student, you will find valuable
insight into the world of cyber crime and cyber warfare. Edited by
experts in computer security, cyber investigations, and
counter-terrorism, and with contributions from computer
researchers, legal experts, and law enforcement professionals,
Cyber Crime and Cyber Terrorism Investigator's Handbook will serve
as your best reference to the modern world of cyber crime.
This book provides readers with a valuable reference on cyber
weapons and, in particular, viruses, software and hardware Trojans.
The authors discuss in detail the most dangerous computer viruses,
software Trojans and spyware, models of computer Trojans affecting
computers, methods of implementation and mechanisms of their
interaction with an attacker - a hacker, an intruder or an
intelligence agent. Coverage includes Trojans in electronic
equipment such as telecommunication systems, computers, mobile
communication systems, cars and even consumer electronics. The
evolutionary path of development of hardware Trojans from
"cabinets", "crates" and "boxes" to the microcircuits (IC) is also
discussed. Readers will benefit from the detailed review of the
major known types of hardware Trojans in chips, principles of their
design, mechanisms of their functioning, methods of their
introduction, means of camouflaging and detecting, as well as
methods of protection and counteraction.
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the
world of keeping computer systems safe from those who want to break
in. This book offers a one-stop resource on cybersecurity basics,
personal security, business security, cloud security, security
testing, and security awareness. Filled with content to help with
both personal and business cybersecurity needs, this book shows you
how to lock down your computers, devices, and systems--and explains
why doing so is more important now than ever. Dig in for info on
what kind of risks are out there, how to protect a variety of
devices, strategies for testing your security, securing cloud data,
and steps for creating an awareness program in an organization.
Explore the basics of cybersecurity at home and in business Learn
how to secure your devices, data, and cloud-based assets Test your
security to find holes and vulnerabilities before hackers do Create
a culture of cybersecurity throughout an entire organization This
For Dummies All-in-One is a stellar reference for business owners
and IT support pros who need a guide to making smart security
choices. Any tech user with concerns about privacy and protection
will also love this comprehensive guide.
This book is about cyber security. In Part 1, the author discusses
his thoughts on the cyber security industry and how those that
operate within it should approach their role with the mindset of an
artist. Part 2 explores the work of Sun Tzu's The Art of War.
|
|