|
Showing 1 - 4 of
4 matches in All Departments
Threat actors, be they cyber criminals, terrorists, hacktivists or
disgruntled employees, are employing sophisticated attack
techniques and anti-forensics tools to cover their attacks and
breach attempts. As emerging and hybrid technologies continue to
influence daily business decisions, the proactive use of cyber
forensics to better assess the risks that the exploitation of these
technologies pose to enterprise-wide operations is rapidly becoming
a strategic business objective. This book moves beyond the typical,
technical approach to discussing cyber forensics processes and
procedures. Instead, the authors examine how cyber forensics can be
applied to identifying, collecting, and examining evidential data
from emerging and hybrid technologies, while taking steps to
proactively manage the influence and impact, as well as the policy
and governance aspects of these technologies and their effect on
business operations. A world-class team of cyber forensics
researchers, investigators, practitioners and law enforcement
professionals have come together to provide the reader with
insights and recommendations into the proactive application of
cyber forensic methodologies and procedures to both protect data
and to identify digital evidence related to the misuse of these
data. This book is an essential guide for both the technical and
non-technical executive, manager, attorney, auditor, and general
practitioner who is seeking an authoritative source on how cyber
forensics may be applied to both evidential data collection and to
proactively managing today's and tomorrow's emerging and hybrid
technologies. The book will also serve as a primary or supplemental
text in both under- and post-graduate academic programs addressing
information, operational and emerging technologies, cyber
forensics, networks, cloud computing and cybersecurity.
Provides answers to key questions affecting the future of
electronic data interchange (EDI) and its impact on the business
community as a whole. This evolving technology is cheaper than fax,
easier to use than electronic bulletin boards and faster than the
postal services. It contains practical information and alerts the
reader to the level and types of controls necessary to protect data
handled through the EDI system interface.
Threat actors, be they cyber criminals, terrorists, hacktivists or
disgruntled employees, are employing sophisticated attack
techniques and anti-forensics tools to cover their attacks and
breach attempts. As emerging and hybrid technologies continue to
influence daily business decisions, the proactive use of cyber
forensics to better assess the risks that the exploitation of these
technologies pose to enterprise-wide operations is rapidly becoming
a strategic business objective. This book moves beyond the typical,
technical approach to discussing cyber forensics processes and
procedures. Instead, the authors examine how cyber forensics can be
applied to identifying, collecting, and examining evidential data
from emerging and hybrid technologies, while taking steps to
proactively manage the influence and impact, as well as the policy
and governance aspects of these technologies and their effect on
business operations. A world-class team of cyber forensics
researchers, investigators, practitioners and law enforcement
professionals have come together to provide the reader with
insights and recommendations into the proactive application of
cyber forensic methodologies and procedures to both protect data
and to identify digital evidence related to the misuse of these
data. This book is an essential guide for both the technical and
non-technical executive, manager, attorney, auditor, and general
practitioner who is seeking an authoritative source on how cyber
forensics may be applied to both evidential data collection and to
proactively managing today's and tomorrow's emerging and hybrid
technologies. The book will also serve as a primary or supplemental
text in both under- and post-graduate academic programs addressing
information, operational and emerging technologies, cyber
forensics, networks, cloud computing and cybersecurity.
|
|