Skip to main content

Syngress

    • Threat Forecasting

      • 1st Edition
      • May 17, 2016
      • John Pirc + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 0 6 9
      • eBook
        9 7 8 0 1 2 8 0 0 4 7 8 4
      Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.
    • OS X Incident Response

      • 1st Edition
      • May 6, 2016
      • Jaron Bradley
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 5 6 8
      • eBook
        9 7 8 0 1 2 8 0 4 5 0 3 9
      OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating many crimes but businesses are recognizing the importance of having skilled forensic investigators on staff in the case of policy violations. Perhaps more importantly, though, businesses are seeing enormous impact from malware outbreaks as well as data breaches. The skills of a forensic investigator are critical to determine the source of the attack as well as the impact. While there is a lot of focus on Windows because it is the predominant desktop operating system, there are currently very few resources available for forensic investigators on how to investigate attacks, gather evidence and respond to incidents involving OS X. The number of Macs on enterprise networks is rapidly increasing, especially with the growing prevalence of BYOD, including iPads and iPhones. Author Jaron Bradley covers a wide variety of topics, including both the collection and analysis of the forensic pieces found on the OS. Instead of using expensive commercial tools that clone the hard drive, you will learn how to write your own Python and bash-based response scripts. These scripts and methodologies can be used to collect and analyze volatile data immediately. For online source codes, please visit: https://github.com/j...
    • Protecting Patient Information

      • 1st Edition
      • April 7, 2016
      • Paul Cerrato
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 3 9 2 9
      • eBook
        9 7 8 0 1 2 8 0 4 4 1 1 7
      Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes. Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization’s information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, the book outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.
    • Hiding Behind the Keyboard

      • 1st Edition
      • March 11, 2016
      • Brett Shavers + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 3 4 0 1
      • eBook
        9 7 8 0 1 2 8 0 3 3 5 2 4
      Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
    • Network Performance and Security

      • 1st Edition
      • March 9, 2016
      • Chris Chapman
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 5 8 4 9
      • eBook
        9 7 8 0 1 2 8 0 3 6 0 1 3
      Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.
    • Windows Registry Forensics

      • 2nd Edition
      • March 3, 2016
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 9 1 6
      • eBook
        9 7 8 0 1 2 8 0 3 3 3 5 7
      Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
    • Implementing Digital Forensic Readiness

      • 1st Edition
      • February 26, 2016
      • Jason Sachowski
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 5 4 4
      • eBook
        9 7 8 0 1 2 8 0 4 5 0 1 5
      Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.
    • Preserving Electronic Evidence for Trial

      • 1st Edition
      • February 15, 2016
      • Ernesto F. Rojas + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 3 3 5 1
      • eBook
        9 7 8 0 1 2 8 0 9 3 6 6 5
      The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic evidence. Corporate management personnel (legal & IT) and outside counsel need reliable processes for the litigation hold – identifying, locating, and preserving electronic evidence. Preserving Electronic Evidence for Trial provides the road map, showing you how to organize the digital evidence team before the crisis, not in the middle of litigation. This practice handbook by an internationally known digital forensics expert and an experienced litigator focuses on what corporate and litigation counsel as well as IT managers and forensic consultants need to know to communicate effectively about electronic evidence. You will find tips on how all your team members can get up to speed on each other’s areas of specialization before a crisis arises. The result is a plan to effectively identify and pre-train the critical electronic-evidence team members. You will be ready to lead the team to success when a triggering event indicates that litigation is likely, by knowing what to ask in coordinating effectively with litigation counsel and forensic consultants throughout the litigation progress. Your team can also be ready for action in various business strategies, such as merger evaluation and non-litigation conflict resolution.
    • Deploying Secure Containers for Training and Development

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 7 0
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 4 7
      In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.
    • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 8 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 5 4
      Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.