![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun. It covers technological advances in virtualization tools, methods, and issues in digital forensic investigations, and explores trends and emerging technologies surrounding virtualization technology. This book consists of three parts. Part I explains the process of virtualization and the different types of virtualized environments. Part II details how virtualization interacts with the basic forensic process, describing the methods used to find virtualization artifacts in dead and live environments as well as identifying the virtual activities that affect the examination process. Part III addresses advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization. This book will be a valuable resource for forensic investigators (corporate and law enforcement) and incident response professionals.
With the explosive growth in mobile phone usage and rapid rise
in search engine technologies over the last decade, augmented
reality (AR) is poised to be one of this decade's most disruptive
technologies, as the information that is constantly flowing around
us is brought into view, in real-time, through augmented reality.
In this cutting-edge book, the authors outline and discuss
never-before-published information about augmented reality and its
capabilities. With coverage of mobile, desktop, developers,
security, challenges, and gaming, this book gives you a
comprehensive understanding of what augmented reality is, what it
can do, what is in store for the future and most importantly: how
to benefit from using AR in our lives and careers.
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy. With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.
|
![]() ![]() You may like...
Extremisms In Africa
Alain Tschudin, Stephen Buchanan-Clarke, …
Paperback
![]()
Eight Days In July - Inside The Zuma…
Qaanitah Hunter, Kaveel Singh, …
Paperback
![]()
|