|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
With the rapid advancement in technology, a myriad of new threats
have emerged in online environments. The broad spectrum of these
digital risks requires new and innovative methods for protection
against cybercrimes. Combating Security Breaches and Criminal
Activity in the Digital Sphere is a pivotal reference source for
the latest scholarly research on current trends in cyber forensic
investigations, focusing on advanced techniques for protecting
information security and preventing potential exploitation for
online users. Featuring law enforcement perspectives, theoretical
foundations, and forensic methods, this book is ideally designed
for policy makers, analysts, researchers, technology developers,
and upper-level students.
The shocking untold story of the elite secret society of hackers
fighting to protect our privacy, our freedom, and even democracy
itself. Cult of the Dead Cow is the tale of the oldest, most
respected, and most famous American hacking group of all time.
Though until now it has remained mostly anonymous, its members
invented the concept of hacktivism, released the top tool for
testing password security, and created what was for years the best
technique for controlling computers from afar, forcing giant
companies to work harder to protect customers. They contributed to
the development of Tor, the most important privacy tool on the net,
and helped build cyberweapons that advanced US security without
injuring anyone. With its origins in the earliest days of the
Internet, the cDc is full of oddball characters -- activists,
artists, even future politicians. Many of these hackers have become
top executives and advisors walking the corridors of power in
Washington and Silicon Valley. The most famous is former Texas
Congressman and current presidential candidate Beto O'Rourke, whose
time in the cDc set him up to found a tech business, launch an
alternative publication in El Paso, and make long-shot bets on
unconventional campaigns. Today, the group and its followers are
battling electoral misinformation, making personal data safer, and
battling to keep technology a force for good instead of for
surveillance and oppression. Cult of the Dead Cow shows how
governments, corporations, and criminals came to hold immense power
over individuals and how we can fight back against them.
"Malware Forensics: Investigating and Analyzing Malicious Code"
covers the emerging and evolving field of "live forensics," where
investigators examine a computer system to collect and preserve
critical live data that may be lost if the system is shut down.
Unlike other forensic texts that discuss "live forensics" on a
particular operating system, or in a generic context, this book
emphasizes a live forensics and evidence collection methodology on
both Windows and Linux operating systems in the context of
identifying and capturing malicious code and evidence of its effect
on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code"
also devotes extensive coverage of the burgeoning forensic field of
physical and process memory analysis on both Windows and Linux
platforms. This book provides clear and concise guidance as to how
to forensically capture and examine physical and process memory as
a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code,
accounted for its evolutionary history, and in some instances,
dedicated a mere chapter or two to analyzing malicious code.
Conversely, "Malware Forensics: Investigating and Analyzing
Malicious Code" emphasizes the practical "how-to" aspect of
malicious code investigation, giving deep coverage on the tools and
techniques of conducting runtime behavioral malware analysis (such
as file, registry, network and port monitoring) and static code
analysis (such as file identification and profiling, strings
discovery, armoring/packing detection, disassembling, debugging),
and more.
* Winner of Best Book Bejtlich read in 2008
* http:
//taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases,
which allows them to provide unparalleled insight to the
reader.
* First book to detail how to perform "live forensic" techniques on
malicous code.
* In addition to the technical topics discussed, this book also
offers critical legal considerations addressing the legal
ramifications and requirements governing the subject matter
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital
tool in the arsenal of today's computer programmers, students, and
investigators. As computer networks become ubiquitous throughout
the world, cyber crime, cyber terrorism, and cyber war have become
some of the most concerning topics in today's security landscape.
News stories about Stuxnet and PRISM have brought these activities
into the public eye, and serve to show just how effective,
controversial, and worrying these tactics can become. Cyber Crime
and Cyber Terrorism Investigator's Handbook describes and analyzes
many of the motivations, tools, and tactics behind cyber attacks
and the defenses against them. With this book, you will learn about
the technological and logistic framework of cyber crime, as well as
the social and legal backgrounds of its prosecution and
investigation. Whether you are a law enforcement professional, an
IT specialist, a researcher, or a student, you will find valuable
insight into the world of cyber crime and cyber warfare. Edited by
experts in computer security, cyber investigations, and
counter-terrorism, and with contributions from computer
researchers, legal experts, and law enforcement professionals,
Cyber Crime and Cyber Terrorism Investigator's Handbook will serve
as your best reference to the modern world of cyber crime.
This book is about cyber security. In Part 1, the author discusses
his thoughts on the cyber security industry and how those that
operate within it should approach their role with the mindset of an
artist. Part 2 explores the work of Sun Tzu's The Art of War.
The EU Data Protection Code of Conduct for Cloud Service Providers
- A guide to complianceFormally founded in 2017, the EU Data
Protection Code of Conduct for Cloud Service Providers (otherwise
known as the EU Cloud Code of Conduct; the Code) is a voluntary
code of conduct created specifically to support GDPR compliance
within the B2B (business-to-business) Cloud industry. The EU
Commission, the Article 29 Working Party (now the European Data
Protection Board (EDPB)), the EU Directorate-General for Justice
and Consumers, and Cloud-industry leaders have all contributed to
its development, resulting in a robust framework that recognises
the unique requirements of the Cloud industry. Cloud providers must
ensure that their services - which by design involve accessing and
transferring data across the Internet, exposing it to far greater
risk than data stored and processed within an organisation's
internal network - meet or exceed the GDPR's requirements in order
to provide the security and privacy that the market expects.
Organisations can achieve this via compliance to the EU Cloud Code
of Conduct. The EU Cloud Code of Conduct has already been adopted
by major Cloud service organisations, including: Microsoft; Oracle;
Salesforce; IBM; Google Cloud; Dropbox; and Alibaba Cloud. Public
and business focus on information security and data protection
continues to increase in the face of a constantly changing threat
landscape and ever-more stringent regulation, and compliance to
initiatives such as the EU Cloud Code of Conduct demonstrates to
current and potential customers that your organisation is taking
data privacy seriously, as well as strengthens your organisation's
overall approach to information security management, and defences
against data breaches. The EU Data Protection Code of Conduct for
Cloud Service Providers provides guidance on how to implement the
Code within your organisation. It explores the objectives of the
Code, and how compliance can be achieved with or without a
pre-existing ISMS (information security management system) within
the organisation. Begin your journey to EU Cloud Code of Conduct
implementation with our guide to compliance - Buy this book today!
|
|