Télécharger le livre :  Phishing Dark Waters
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing...

Editeur : Wiley
Parution : 2015-03-18
PDF, ePub

31,65

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to Social Media Investigation
If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds...

Editeur : Syngress
Parution : 2015-03-14
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Mobile Application Hacker's Handbook
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book...

Editeur : Wiley
Parution : 2015-02-17
PDF, ePub

56,97

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Process of Investigation
The Process of Investigation, Fourth Edition addresses the needs of today’s private sector investigative professional by providing a full-spectrum treatment of the investigative process, from case inception and investigative strategy selection to executing complex...

Editeur : Butterworth-Heinemann
Parution : 2014-12-30
PDF

61,14

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Digital Forensics
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to...

Editeur : Syngress
Parution : 2014-12-09
PDF, epub sans DRM

29,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Earth Forensics
Google Earth Forensics is the first book to explain how to useGoogle Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows...

Editeur : Syngress
Parution : 2014-12-09
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Augmented Reality Law, Privacy, and Ethics
Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position...

Editeur : Syngress
Parution : 2014-12-09
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Optimizing IEEE 802.11i Resource and Security Essentials
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for...

Editeur : Syngress
Parution : 2014-12-05
PDF, epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to US Cybersecurity Careers
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity...

Editeur : Syngress
Parution : 2014-12-05
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Attack and Defend Your Website
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application,...

Editeur : Syngress
Parution : 2014-12-05
PDF, epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Defeat Advanced Malware
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages...

Editeur : Syngress
Parution : 2014-12-05
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing VoIP
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud...

Editeur : Syngress
Parution : 2014-11-14
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Designing and Building Security Operations Center
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and...

Editeur : Syngress
Parution : 2014-11-06
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Reconnaissance, Surveillance and Defense
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being...

Editeur : Syngress
Parution : 2014-10-17
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Der Cyber-Versicherungsmarkt in Deutschland
Diese Dokumentation schlägt eine Schneise durch das Dickicht des Versicherungsmarktes der Cyber-Policen. Versicherungen gegen Cyberkriminalität werden zunehmend wichtiger: Angriffe auf die Informationstechnik von Unternehmen können Schäden in Millionenhöhe hinterlassen,...

Editeur : Springer Gabler
Parution : 2014-10-08
Collection : essentials PDF, ePub

4,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Detecting and Combating Malicious Email
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully...

Editeur : Syngress
Parution : 2014-10-07
PDF, epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Studying and Designing Technology for Domestic Life
Conducting research and technology design for domestic life is by no means easy. Methods commonly used in the field of Human-Computer Interaction in settings like the workplace may not easily translate to the richness and complexity of domestic life. This book...

Editeur : Morgan Kaufmann
Parution : 2014-09-26
PDF, epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Online Risk
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online...

Editeur : Butterworth-Heinemann
Parution : 2014-09-25
PDF, epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CSA Guide to Cloud Computing
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years theCSA has been at the forefront of research...

Editeur : Syngress
Parution : 2014-09-22
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security and Resiliency Policy Framework
Cyberspace is a ubiquitous realm interconnecting every aspect of modern society, enabled by broadband networks and wireless signals around us, existing within local area networks in our schools, hospitals and businesses, and within the massive grids that power most...

Editeur : SAGE Publications Ltd
Parution : 2014-09-15
PDF

94,02

Téléchargement immédiat
Dès validation de votre commande
<< < 1314151617 >