Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes.
Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files.
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release.
Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes.
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies.
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure.
CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP certification.
Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades.
Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations.
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack.
Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure.
Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets.
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world.
Understand the cyber kill chain framework and discover essential tactics and strategies to effectively prevent cyberattacksFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesExplore each stage of the cyberattack process using the cyber kill chain and track threat actor movementsLearn key components of threat intelligence and how they enhance the cyber kill chainApply practical examples and case studies for effective, real-time responses to cyber threatsBook DescriptionGain a strategic edge in cybersecurity by mastering the systematic approach to identifying and responding to cyber threats through a detailed exploration of the cyber kill chain framework.
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack.
Cybersecurity threats are not isolated occurrences and must be recognized as global operations requiring collaborative measures to prepare cyber graduates and organizations personnel on the high impact of cybercrimes and the awareness, understanding, and obligation to secure, control, and protect the organizations vital data and information and sharing them on social media sites.
This compilation details the challenges in the development of computer systems more complexed by AI/IoT using examples based on systems thinking, as well as introduces how these technologies can aid in safety and security.
Federal agencies and our nation's critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information.