|
Showing 1 - 5 of
5 matches in All Departments
Electronic discovery refers to a process in which electronic data
is sought, located, secured, and searched with the intent of using
it as evidence in a legal case. Computer forensics is the
application of computer investigation and analysis techniques to
perform an investigation to find out exactly what happened on a
computer and who was responsible. IDC estimates that the U.S.
market for computer forensics will be grow from $252 million in
2004 to $630 million by 2009. Business is strong outside the United
States, as well. By 2011, the estimated international market will
be $1.8 billion dollars. The Techno Forensics Conference has
increased in size by almost 50% in its second year; another example
of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic
topics to provides law enforcement and IT security professionals
with the information needed to manage a digital investigation.
Everything needed for analyzing forensic data and recovering
digital evidence can be found in one place, including instructions
for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents
related to corporate espionage or other criminal activities are
learning as they go and need a comprehensive step-by-step guide to
e-discovery
* Appeals to law enforcement agencies with limited budgets
Low Tech Hacking teaches your students how to avoid and defend
against some of the simplest and most common hacks. Criminals using
hacking techniques can cost corporations, governments, and
individuals millions of dollars each year. While the media focuses
on the grand-scale attacks that have been planned for months and
executed by teams and countries, there are thousands more that
aren't broadcast. This book focuses on the everyday hacks that,
while simple in nature, actually add up to the most significant
losses. It provides detailed descriptions of potential threats and
vulnerabilities, many of which the majority of the information
systems world may be unaware. It contains insider knowledge of what
could be your most likely low-tech threat, with timely advice from
some of the top security minds in the world. Author Jack Wiles
spent many years as an inside penetration testing team leader,
proving that these threats and vulnerabilities exist and their
countermeasures work. His contributing authors are among the best
in the world in their respective areas of expertise. The book is
organized into 8 chapters covering social engineering; locks and
ways to low tech hack them; low tech wireless hacking; low tech
targeting and surveillance; low tech hacking for the penetration
tester; the law on low tech hacking; and information security
awareness training as a countermeasure to employee risk. This book
will be a valuable resource for penetration testers, internal
auditors, information systems auditors, CIOs, CISOs, risk managers,
fraud investigators, system administrators, private investigators,
ethical hackers, black hat hackers, corporate attorneys, and
members of local, state, and federal law enforcement.
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues
affecting SCADA systems and overall critical infrastructure
protection. The respective co-authors are among the leading experts
in the world capable of addressing these related-but-independent
concerns of SCADA security. Headline-making threats and
countermeasures like malware, sidejacking, biometric applications,
emergency communications, security awareness llanning, personnel
& workplace preparedness and bomb threat planning will be
addressed in detail in this one of a kind book-of-books dealing
with the threats to critical infrastructure protection. They
collectivly have over a century of expertise in their respective
fields of infrastructure protection. Included among the
contributing authors are Paul Henry, VP of Technology Evangelism,
Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone
Technologies, Phil Drake, Telecommunications Director, The
Charlotte Observer, Patrice Bourgeois, Tenable Network Security,
Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb
Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of
the complexities of SCADA security and its impact on critical
infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA
and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat
planning, emergency communications, employee safety and much
more
* Companion Website featuring video interviews with subject matter
experts offer a "sit-down" with the leaders in the field
This book provides IT security professionals with the information
(hardware, software, and procedural requirements) needed to create,
manage and sustain a digital forensics lab and investigative team
that can accurately and effectively analyze forensic data and
recover digital evidence, while preserving the integrity of the
electronic evidence for discovery and trial.
IDC estimates that the U.S. market for computer forensics will be
grow from $252 million in 2004 to $630 million by 2009. Business is
strong outside the United States, as well. By 2011, the estimated
international market will be $1.8 billion dollars. The Techno
Forensics Conference, to which this book is linked, has increased
in size by almost 50% in its second year; another example of the
rapid growth in the digital forensics world.
The TechnoSecurity Guide to Digital Forensics and E-Discovery
features:
* Internationally known experts in computer forensics share their
years of experience at the forefront of digital forensics
* Bonus chapters on how to build your own Forensics Lab
* 50% discount to the upcoming Techno Forensics conference for
everyone
who purchases a book
This book contains some of the most up-to-date information
available anywhere on a wide variety of topics related to Techno
Security. As you read the book, you will notice that the authors
took the approach of identifying some of the risks, threats, and
vulnerabilities and then discussing the countermeasures to address
them. Some of the topics and thoughts discussed here are as new as
tomorrow s headlines, whereas others have been around for decades
without being properly addressed. I hope you enjoy this book as
much as we have enjoyed working with the various authors and
friends during its development. Donald Withers, CEO and Cofounder
of TheTrainingCo.
Jack Wiles, on Social Engineering offers up a potpourri of tips,
tricks, vulnerabilities, and lessons learned from 30-plus years of
experience in the worlds of both physical and technical security.
Russ Rogers on the Basics of Penetration Testing illustrates the
standard methodology for penetration testing: information
gathering, network enumeration, vulnerability identification,
vulnerability exploitation, privilege escalation, expansion of
reach, future access, and information compromise.
Johnny Long on No Tech Hacking shows how to hack without touching
a computer using tailgating, lock bumping, shoulder surfing, and
dumpster diving.
Phil Drake on Personal, Workforce, and Family Preparedness covers
the basics of creating a plan for you and your family, identifying
and obtaining the supplies you will need in an emergency.
Kevin O Shea on Seizure of Digital Information discusses
collecting hardware and information from the scene.
Amber Schroader on Cell Phone Forensics writes on new methods and
guidelines for digital forensics.
Dennis O Brien on RFID: An Introduction, Security Issues, and
Concerns discusses how this well-intended technology has been
eroded and used for fringe implementations.
Ron Green on Open Source Intelligence details how a good Open
Source Intelligence program can help you create leverage in
negotiations, enable smart decisions regarding the selection of
goods and services, and help avoid pitfalls and hazards.
Raymond Blackwood on Wireless Awareness: Increasing the
Sophistication of Wireless Users maintains it is the technologist s
responsibility to educate, communicate, and support users despite
their lack of interest in understanding how it works.
Greg Kipper on What is Steganography? provides a solid
understanding of the basics of steganography, what it can and can t
do, and arms you with the information you need to set your career
path.
Eric Cole on Insider Threat discusses why the insider threat is
worse than the external threat and the effects of insider threats
on a company.
*Internationally known experts in information security share their
wisdom
*Free pass to Techno Security Conference for everyone who purchases
a book $1,200 value
*2-HOUR DVD with cutting edge information on the future of
information security"
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Sound Of Freedom
Jim Caviezel, Mira Sorvino, …
DVD
R325
R218
Discovery Miles 2 180
|