You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits. What do you do?
Simple. You follow your business continuity/disaster recovery plan. If you've prepared in advance, your operation or your company can continue to conduct business while...
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators...
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
According to the International Basic Safety Standards an accident is “any
unintended event, including operating errors, equipment failures or other mishaps, the
consequences or potential consequences of which are not negligible from the point of
view of protection or safety” [1].
Prepare yourself for the newest CompTIA certification
The CompTIA Cybersecurity Analyst+ (CySA+) Study Guide provides 100% coverage of all exam objectives for the new CySA+ certification. The CySA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis,...
Misadventures in Health Care: Inside Stories presents an alternative approach to attributing the cause of medical error solely to the health care provider. That alternative, the systems approach, pursues why an incident occurs in terms of factors in the context of care that affect the care provider to induce an error. The basis for...
Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Develop and implement an effective end-to-end security program
Today’s complex world of mobile platforms, cloud...
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...