1
by Volonino, Linda
Published 2008
Wiley
Table of Contents: ...Part I: Digging Out and Documenting Electronic Evidence -- pt. II: Preparing to Crack the Case...

2
by Howard, Richard
Published 2023
John Wiley & Sons, Incorporated
... that the profession needs to get back to first principles. The author convincingly lays out the arguments...

3
by Krausz, Michael
Published 2013
IT Governance Pub.
... that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data...

4
by Sulkin, Oleg, Courcier, Scar de
Published 2017
Packt Publishing
... will be able to carry out forensics investigations efficiently. Style and approach This practical guide filled...

5
by Wilhelm, Thomas
Published 2011
Syngress/Elsevier
.... Throw traditional pen testing methods out the window for now and see how thinking and acting like a...

6
by Mirkovic, Jelena, Dietrich, Sven, Dittrich, David
Published 2004
Pearson
... and researching defense approaches is laid out clearly in practical, detailed terms...

7
Published 2022
O'Reilly Media, Inc.
... out of the system until a ransom is paid. Within hours, a thriving business can completely lose access...

8
by Golden, Ryan, Freed, Anthony M.
Published 2024
O'Reilly Media, Inc.
... are extremely lucrative, with ransom demands and recovery costs bleeding victim organizations out of millions...

9 ... that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved...

10
by Fichera, Joe
Published 2012
Syngress
...Nearly every business depends on its network to provide information services to carry out essential...

11
by Davidoff, Sherri
Published 2020
Addison-Wesley
... by breaches and avoiding common mistakes that cause them to spiral out of control. You'll learn how to manage...

12
by Shema, Mike
Published 2012
Syngress
... Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you...

13
by Bergman, Neil
Published 2013
McGraw-Hill
...-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services...

14
Published 2023
Packt Publishing

15
Published 2023
Packt Publishing
... believes we all have one shot at life and should live life to the fullest, constantly stepping out of our...

16
by Skulkin, Oleg
Published 2022
Packt Publishing, Limited
... the most out of this book...

17
by Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents: ... -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device...

18
by Windley, Phillip J.
Published 2005
O'Reilly
... of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a...