|
Showing 1 - 3 of
3 matches in All Departments
Electronic discovery refers to a process in which electronic data
is sought, located, secured, and searched with the intent of using
it as evidence in a legal case. Computer forensics is the
application of computer investigation and analysis techniques to
perform an investigation to find out exactly what happened on a
computer and who was responsible. IDC estimates that the U.S.
market for computer forensics will be grow from $252 million in
2004 to $630 million by 2009. Business is strong outside the United
States, as well. By 2011, the estimated international market will
be $1.8 billion dollars. The Techno Forensics Conference has
increased in size by almost 50% in its second year; another example
of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic
topics to provides law enforcement and IT security professionals
with the information needed to manage a digital investigation.
Everything needed for analyzing forensic data and recovering
digital evidence can be found in one place, including instructions
for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents
related to corporate espionage or other criminal activities are
learning as they go and need a comprehensive step-by-step guide to
e-discovery
* Appeals to law enforcement agencies with limited budgets
Low Tech Hacking teaches your students how to avoid and defend
against some of the simplest and most common hacks. Criminals using
hacking techniques can cost corporations, governments, and
individuals millions of dollars each year. While the media focuses
on the grand-scale attacks that have been planned for months and
executed by teams and countries, there are thousands more that
aren't broadcast. This book focuses on the everyday hacks that,
while simple in nature, actually add up to the most significant
losses. It provides detailed descriptions of potential threats and
vulnerabilities, many of which the majority of the information
systems world may be unaware. It contains insider knowledge of what
could be your most likely low-tech threat, with timely advice from
some of the top security minds in the world. Author Jack Wiles
spent many years as an inside penetration testing team leader,
proving that these threats and vulnerabilities exist and their
countermeasures work. His contributing authors are among the best
in the world in their respective areas of expertise. The book is
organized into 8 chapters covering social engineering; locks and
ways to low tech hack them; low tech wireless hacking; low tech
targeting and surveillance; low tech hacking for the penetration
tester; the law on low tech hacking; and information security
awareness training as a countermeasure to employee risk. This book
will be a valuable resource for penetration testers, internal
auditors, information systems auditors, CIOs, CISOs, risk managers,
fraud investigators, system administrators, private investigators,
ethical hackers, black hat hackers, corporate attorneys, and
members of local, state, and federal law enforcement.
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues
affecting SCADA systems and overall critical infrastructure
protection. The respective co-authors are among the leading experts
in the world capable of addressing these related-but-independent
concerns of SCADA security. Headline-making threats and
countermeasures like malware, sidejacking, biometric applications,
emergency communications, security awareness llanning, personnel
& workplace preparedness and bomb threat planning will be
addressed in detail in this one of a kind book-of-books dealing
with the threats to critical infrastructure protection. They
collectivly have over a century of expertise in their respective
fields of infrastructure protection. Included among the
contributing authors are Paul Henry, VP of Technology Evangelism,
Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone
Technologies, Phil Drake, Telecommunications Director, The
Charlotte Observer, Patrice Bourgeois, Tenable Network Security,
Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb
Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of
the complexities of SCADA security and its impact on critical
infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA
and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat
planning, emergency communications, employee safety and much
more
* Companion Website featuring video interviews with subject matter
experts offer a "sit-down" with the leaders in the field
|
|