1
by Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents: ... of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5...

2
by Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Table of Contents: ... -- Cybersecurity policies and procedures -- Cyber strategic performance management -- Standards and frameworks...

3
Published 2013
Morgan Kaufmann/Elsevier
... aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance...

4
by Diogenes, Yuri, Ozkaya, Erdal
Published 2018
Packt Publishing
Table of Contents: ... -- Forming a disaster recovery team -- Performing risk assessment -- Prioritizing processes and operations...

5
by Luttgens, Jason T.
Published 2014
McGraw-Hill Education
Table of Contents: ...Questions -- Part III: Data Collection -- Chapter 7: Live Data Collection -- When to Perform a Live...

6
by Shaaban, Ayman, Sapronov, Konstantin
Published 2016
Packt Publishing
... of performing forensics on Windows-based systems using digital artifacts.It uses specific open source and Linux...

7
by Dunham, Ken
Published 2009
Syngress Pub.
..., current, and future risks, protect your banking, auctioning, and other activities performed on mobile...

8
by Wilhelm, Thomas
Published 2011
Syngress/Elsevier
... the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform...

9
by Sulkin, Oleg, Courcier, Scar de
Published 2017
Packt Publishing
... to troubleshoot issues that arise while performing digital forensic investigations. By the end of the book, you...

10
by Engebretson, Patrick
Published 2013
Syngress
... to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret...

11
by Troncone, Paul, Albing, Carl
Published 2019
O'Reilly Media
.... This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection...

12
by Datt, Samir
Published 2016
Packt Publishing
... traffic acquisition software and know how to manage and handle the evidence Perform packet analysis...

13 ... or performing a forensic investigation of systems that run on Windows operating systems. It also includes...

14
by Ligh, Michael Hale, Case, Andrew, Levy, Jamie, Walters, Aaron
Published 2014
John Wiley and Sons
... to the investigative process. This book provides a comprehensive guide to performing memory forensics for Windows...

15
by Jaswal, Nipun
Published 2019
Packt Publishing
... will have gained hands-on experience of performing forensics analysis tasks. What you will learn Discover...