|
|
|
|
|
|
Destroying the Village
Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy
threatening to end your national existence was right, natural, and necessary. In the wake of World War Two
this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the
notion of just... | | Mac OS X, iPod, and iPhone Forensic Analysis DVD ToolkitThis book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic... | | Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help... |
|
Reverse Engineering Code with IDA Pro
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and... | | Digital Forensics: Digital Evidence in Criminal Investigations
The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific... | | Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.
Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years.... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |