|
|
|
|
Learning iOS Forensics
A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools
About This Book
-
Perform logical, physical, and file system acquisition along with jailbreaking the device
-
Get acquainted with various case studies on different forensic toolkits...
| | Pro Drupal 7 Development
In its relatively short life, Drupal has had a tremendous impact on the landscape of the Internet. As a web content management system, Drupal has enabled the creation of feature- and content-rich web sites for organizations large and small. As a web application framework, Drupal is changing the way that people think about web application... | | PC Magazine Windows XP Security SolutionsThink you're safe?
Guess what?
Studies have estimated that up to 90 percent of computers are infected by some security threat or another. There's a good chance yours is among them, but any computer can be easily secured to a high level-if you know what you're doing.
They're out there. Trust PC Magazine to... |
|
|
|
Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... | | RFID SecurityRFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to... | | Stealing the Network: How to Own a ShadowThe best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress... |
|
|
Result Page: 5 4 3 2 1 |