Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

Building Cisco Remote Access Networks
Building Cisco Remote Access Networks
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
This book’s primary goal is to help you prepare to take and pass Microsoft’s exam number
70-290, Managing and Maintaining a Microsoft Windows Server 2003 Environment. Our secondary
purpose in writing this book is to provide exam candidates with knowledge and
skills that go beyond the minimum requirements for passing the
...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy