Search alternatives:
wells » cells, tells

1
by Rehberger, Johann
Published 2020
Packt Publishing
... with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you...

2
by Nesterenko, Sergii
Published 2018
Packt
... harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see...

3
by Lillard, Terrence
Published 2010
Syngress
... and analyzed from network traffic. This book will help security and network forensics professionals, as well...

4
by Quayson, Ato
Published 2012
Routledge
.... Such labour migration is sometimes legal and well managed, but sometimes not so - with migrant workers...

5
by Bunting, Steve
Published 2012
Wiley
... investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The only official...

6
Published 2022
Assemble You
... responses to make us voluntarily compromise our own security. In this track, we'll learn about social...

7
by Moyo, Siegfried
Published 2022
Wiley
... of cyber risk that will enable executive leadership to make well-informed decisions along with their senior...

8
Published 2017
O'Reilly Media, Inc.
...- to intermediate-level IT professionals as well as law enforcement personnel can learn to use tools like Volatility...

9
by Vagata, Pamela
Published 2019
O'Reilly
... already had a well-tuned feature-engineered model for comparison. Stripe found that the deep learning...

10
by Liska, Allan
Published 2018
O'Reilly Media
... abreast of current as well as future threats. Understand exactly what threat intelligence is, and how...

11
by Howard, Richard
Published 2023
John Wiley & Sons, Incorporated
... professionals, mid-level practitioner veterans, newbies coming out of school as well as career-changers seeking...

12
by Hand, Jason
Published 2017
O'Reilly Media
... analyses don't work well in modern IT organizations, mainly because the command-and-control approach offers...

13 ... accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a...

14
by DeFranco, Joanna F.
Published 2014
CRC Press
... employer invests in training their engineers in understanding the risk. It is a well-known fact...

15
by Evans, Ariel
Published 2022
Routledge
... guide for professionals as well as a key text for students studying this field. The book is essential...

16
by Fichera, Joe
Published 2012
Syngress
... investigation. The book focuses on the methodology of an attack as well as the investigative methodology...

17
by Wiles, Jack
Published 2007
Syngress Pub.
... outside the United States, as well. By 2011, the estimated international market will be $1.8 billion...

18
by Street, Jayson E.
Published 2010
Syngress/Elsevier
... (as well as everyday people interested in security) will find a gripping story that takes the reader on a...

19
by Bergman, Neil
Published 2013
McGraw-Hill

20
by Cappelli, Dawn
Published 2012
Addison-Wesley
...For each, they present a crime profile describing how the crime tends to evolve over time, as well...