I am not an expert. I have never claimed to be an expert at anything
(at least not seriously done so), least of all an expert in forensic
analysis. I am not an expert in Windows Registry analysis. I am
simply, by profession, a responder and analyst with some work
and research experience in this area. I have also performed a
number...
LEGO has been a part of my life since I was about four years old. My first sets were basic
LEGO SYSTEM sets. However, I soon lumped to the early TECHNIC sets that were
beginning to appear on the market. Because I was one of those kids who had to take everything
apart to figure out how it worked, TECHNIC seemed like a good fit for me....
"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...
The intention of this book is to provide a thorough reference for those considering a migration
into the virtualized world. The majority of our target readers will likely be seasoned system
administrators and engineers who grew up in and still manage primarily a hardware-based
server environment containing a large assortment of both...
I suppose there are several questions that may be running through your head
as you contemplate reading this book: Who is the intended audience for this
book? How is this book different from book ‘x’ (insert your favorite title here)?
Why should I buy it? Because these are all fair questions and I am asking you
to plunk...
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
LEGO MINDSTORMS lets you design and program robots that can do just about anything!
The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination. Initially designed for users 12 and up, LEGO MINDSTORMS has taken off with LEGO enthusiasts of...
Information is the most valuable resource in the 21st century. Whether for a
consumer looking for a restaurant in San Francisco, a small business woman checking
textile prices in Bangalore, or a financial services executive in London studying
stock market trends, information at the moment of decision is key in providing the...
Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names...
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...