The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common Body of Knowledge. The ten domains are covered completely and as...
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version...
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary
form as early as the 1960’s, AR is only now becoming truly practical. Recent
advances in mobile processing, coupled with an explosion in digital storage capacity,
ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...
If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
Penetration testing is often considered an art as much as it is a science, but even an
artist needs the right brushes to do the job well. Many commercial and open source
tools exist for performing penetration testing, but it’s often hard to ensure that you
know what tools are available and which ones to use for a certain task....
LEGO has been a part of my life since I was about four years old. My first sets were basic
LEGO SYSTEM sets. However, I soon lumped to the early TECHNIC sets that were
beginning to appear on the market. Because I was one of those kids who had to take everything
apart to figure out how it worked, TECHNIC seemed like a good fit for me....
I am not an expert. I have never claimed to be an expert at anything
(at least not seriously done so), least of all an expert in forensic
analysis. I am not an expert in Windows Registry analysis. I am
simply, by profession, a responder and analyst with some work
and research experience in this area. I have also performed a
number...