Skip to main content

Books in Computer security

91-100 of 403 results in All results

Computers and the General Practitioner

  • 1st Edition
  • May 9, 2014
  • Alastair Malcolm + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 8 9 9 9 - 4
Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis. The selection first tackles general practice and technological promise and experience of pioneers. Topics include information systems and general practice, trends in silicon chip technology, and problems of computer usage in National Health Service practice. The publication then examines security in computer controlled information systems and national strategy for primary care computing, including security defenses, linked systems, cryptography, and basic system. The text takes a look at the computer education of the general practitioner, use of computers in the consulting room, and ECG analysis by computer in general practice. Discussions focus on the problems associated with educating doctors, features of a heuristic system, and the function of the computer as a general practitioner's diagnostic assistant. The selection is a dependable source of data for doctors and readers interested in exploring the applications of computers in health services.

Targeted Cyber Attacks

  • 1st Edition
  • April 18, 2014
  • Aditya Sood + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 6 0 4 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 6 1 9 - 1
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.

Social Engineering Penetration Testing

  • 1st Edition
  • April 11, 2014
  • Gavin Watson + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 1 2 4 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 1 8 2 - 8
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.

Collaboration with Cloud Computing

  • 1st Edition
  • April 7, 2014
  • Ric Messier
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 0 4 0 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 2 3 - 7
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network

Windows Forensic Analysis Toolkit

  • 4th Edition
  • March 11, 2014
  • Harlan Carvey
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 1 5 7 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 7 4 - 9
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.

The Art of Investigative Interviewing

  • 3rd Edition
  • December 27, 2013
  • Inge Sebyan Black
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 1 5 7 7 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 5 8 3 - 5
The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative interviewing, such as human psychology, proper interview preparation, tactical concepts, controlling the interview environment, and evaluating the evidence obtained from the interview. Inge Sebyan Black updated the well-respected work of Charles L. Yeschke to provide everything an interviewer needs to know in order to conduct successful interviews professionally, with integrity, and within the law. This book covers the myriad factors of an interview — including issues of evidence, rapport, deception, authority, and setting — clearly and effectively. It also includes a chapter on personnel issues and internal theft controls.

Malware Forensics Field Guide for Linux Systems

  • 1st Edition
  • December 7, 2013
  • Eoghan Casey + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 4 7 0 - 0
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 4 7 1 - 7
Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program. This book will appeal to computer forensic investigators, analysts, and specialists.

Hacking with Kali

  • 1st Edition
  • December 4, 2013
  • James Broad + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 8 8 3 - 3
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

Applied Network Security Monitoring

  • 1st Edition
  • November 26, 2013
  • Chris Sanders + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 2 0 8 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 2 1 6 - 6
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.

Cloud Storage Forensics

  • 1st Edition
  • November 16, 2013
  • Darren Quick + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 7 0 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 9 1 - 0
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.