|
Showing 1 - 4 of
4 matches in All Departments
When it comes to computer crimes, the criminals got a big head
start. But the law enforcement and IT security communities are now
working diligently to develop the knowledge, skills, and tools to
successfully investigate and prosecute Cybercrime cases. When the
first edition of "Scene of the Cybercrime" published in 2002, it
was one of the first books that educated IT security professionals
and law enforcement how to fight Cybercrime. Over the past 5 years
a great deal has changed in how computer crimes are perpetrated and
subsequently investigated. Also, the IT security and law
enforcement communities have dramatically improved their ability to
deal with Cybercrime, largely as a result of increased spending and
training. According to the 2006 Computer Security Institute's and
FBI's joint Cybercrime report: 52% of companies reported
unauthorized use of computer systems in the prior 12 months. Each
of these incidents is a Cybecrime requiring a certain level of
investigation and remediation. And in many cases, an investigation
is mandates by federal compliance regulations such as
Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data
Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and
updated book which covers all of the technological, legal, and
regulatory changes, which have occurred since the first edition.
The book is written for dual audience; IT security professionals
and members of law enforcement. It gives the technical experts a
little peek into the law enforcement world, a highly structured
environment where the "letter of the law" is paramount and
procedures must be followed closely lest an investigation be
contaminated and all the evidence collected rendered useless. It
also provides law enforcement officers with an idea of some of the
technical aspects of how cyber crimes are committed, and how
technology can be used to track down and build a case against the
criminals who commit them. Scene of the Cybercrime, Second Editions
provides a roadmap that those on both sides of the table can use to
navigate the legal and technical landscape to understand, prevent,
detect, and successfully prosecute the criminal behavior that is as
much a threat to the online community as "traditional" crime is to
the neighborhoods in which we live. Also included is an all new
chapter on Worldwide Forensics Acts and Laws.
* Companion Web site provides custom tools and scripts, which
readers can download for conducting digital, forensic
investigations.
* Special chapters outline how Cybercrime investigations must be
reported and investigated by corporate IT staff to meet federal
mandates from Sarbanes Oxley, and the Payment Card Industry (PCI)
Data Security Standard
* Details forensic investigative techniques for the most common
operating systems (Windows, Linux and UNIX) as well as cutting edge
devices including iPods, Blackberries, and cell phones.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's
flagship firewall product ISA Server, as a result of Tom's
prominent role as a member of the beta development team, and Tom
and Deb's featured placement on both Microsoft's ISA Server Web
site and ISAserver.org. Tom and Deb's book on the first release of
the product "Configuring ISA Server 2000" dominated the ISA Server
2000 book market having sold over 40,000 copies worldwide, and the
ISA Server community is eagerly awaiting Tom and Deb's book on ISA
Server 2004, which is the dramatically upgraded new release from
Microsoft.
Dr. Tom and Debra Shinder have become synonymous with Microsoft's
flagship firewall product ISA Server, as a result of Tom's
prominent role as a member of the beta development team, and Tom
and Deb's featured placement on both Microsoft's ISA Server Web
site and ISAserver.org. Tom and Deb's book on the first release of
the product "Configuring ISA Server 2000" dominated the ISA Server
2000 book market having sold over 40,000 copies worldwide, and the
ISA Server community is eagerly awaiting Tom and Deb's book on ISA
Server 2004, which is the dramatically upgraded new release from
Microsoft. This book will be featured prominently on the
ISAserver.org home page as well as referenced on Microsoft TechNet
and ISA Server Web pages. Tom and Deb's unparalleled technical
expertise combined with prime on-line marketing opportunities will
make this the #1 book again in the ISA Server market.
* This book will provide readers with unparalleled information on
installing, confiuguring, and troubleshooting ISA Server 2004 by
teaching readers to: * Deploy ISA Server 2004 in small businesses
and large organizations.
* Learn how to configure complex DMZ configurations using ISA
Server 2004's new network awareness features and built-in
multinetworking capabilities.
* Learn how to take advantage of ISA Server 2004's new VPN
capabilities
"Windows Server 2012 Security from End to Edge and Beyond" shows
you how to architect, design, plan, and deploy Microsoft security
technologies for Windows 8/Server 2012 in the enterprise. The book
covers security technologies that apply to both client and server
and enables you to identify and deploy Windows 8 security features
in your systems based on different business and deployment
scenarios. The book is a single source for learning how to secure
Windows 8 in many systems, including core, endpoint, and anywhere
access.
Authors Tom Shinder and Yuri Diogenes, both Microsoft employees,
bring you insider knowledge of the Windows 8 platform, discussing
how to deploy Windows security technologies effectively in both the
traditional datacenter and in new cloud-based solutions. With this
book, you will understand the conceptual underpinnings of Windows 8
security and how to deploy these features in a test lab and in
pilot and production environments.
The book's revolutionary "Test Lab Guide" approach lets you test
every subject in a predefined test lab environment. This, combined
with conceptual and deployment guidance, enables you to understand
the technologies and move from lab to production faster than ever
before. Critical material is also presented in key concepts and
scenario-based approaches to evaluation, planning, deployment, and
management. Videos illustrating the functionality in the Test Lab
can be downloaded from the authors blog http:
//blogs.technet.com.b.security_talk/. Each chapter wraps up with a
bullet list summary of key concepts discussed in the chapter.
Provides practical examples of how to design and deploy a
world-class security infrastructure to protect both Windows 8 and
non-Microsoft assets on your systemWritten by two Microsoft
employees who provide an inside look at the security features of
Windows 8 Test Lab Guides enable you to test everything before
deploying live to your system"
How to Cheat at Configuring ISA (Internet Security and
Acceleration) Server 2004 meets the needs of system administrators
for a concise, step-by-step guide to getting one of Microsoft's
most complex server products up and running. While books twice its
size may be perfect for network designers and security specialists,
this is written for the person in the trenches actually running the
network day to day.
How to Cheat at Configuring ISA Server 2004 is written for the vast
majority of Windows System Administrators with too much to do and
too little time in which to do it. Unlike books twice its size,
this is a concise, to-the-point guide.
* Administrators daily jobs - too many mission critical tasks in
too little time. A quick reference to ISA Server
* Written by Dr. Tom Shinder, the undisputed authority on
Installing, Configuring, Managing and Troubleshooting ISA Server
* Includes independent advice on when the "Microsoft Way" works,
and when another approach might be more appropriate to your
situation
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Kill Joy
Holly Jackson
Paperback
R240
R192
Discovery Miles 1 920
|