0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

Low Tech Hacking - Street Smarts for Security Professionals (Paperback): Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ... Low Tech Hacking - Street Smarts for Security Professionals (Paperback)
Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
R986 R862 Discovery Miles 8 620 Save R124 (13%) Ships in 10 - 15 working days

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure... Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure (Paperback)
Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson Jr., …
R1,361 Discovery Miles 13 610 Ships in 10 - 15 working days

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Screendance - Inscribing the Ephemeral…
Douglas Rosenberg Hardcover R2,770 Discovery Miles 27 700
Autobiography and Performance…
Deirdre Heddon Hardcover R1,562 Discovery Miles 15 620
Micro and Nanolignin in Aqueous…
Debora Puglia, Carlo Santulli, … Paperback R5,130 Discovery Miles 51 300
SQL Server - Common Problems, Tested…
Neil Pike Mixed media product R1,033 R912 Discovery Miles 9 120
Masters Of Death
Olivie Blake Paperback R385 R349 Discovery Miles 3 490
Shakespeare - The Man Who Pays The Rent
Judi Dench Paperback R295 R263 Discovery Miles 2 630
Advances in Catalysis, Volume 63
Chunshan Song Hardcover R4,617 Discovery Miles 46 170
Organic Chemistry
John McMurry Hardcover R1,451 R1,358 Discovery Miles 13 580
The Place of His Presence - Awakening to…
Daniel Amstutz Hardcover R824 Discovery Miles 8 240
Nonequilibrium Thermodynamics…
Yasar Demirel, Vincent Gerbaud Paperback R6,619 R6,115 Discovery Miles 61 150

 

Partners