Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic...
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...
To have a successful career as a Cisco Certified Network Associate (CCNA), it is imperative that you understand the terminology used by individuals in the field of networking. To communicate effectively with peers and staff, you need to have a firm grasp on concepts and jargon you will be exposed to as a CCNA. Understanding basic terms and...
Boring, boring, boring. Isn’t this what immediately comes to mind when one
sees books on foundational concepts of information security? Monotonous
coverage of theory, dry details of history, brief yet inadequate coverage of every
topic known to man, even though you know that you’ll never be hired by the
NSA as a...
What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a
bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche
is a process that builds new information upon previous knowledge as we learn. As Isaac Newton
said, “If I have seen further than...
The 11th Hour Linux+ Study Guide is keyed to the XK0-003 revision of the CompTIA Linux+exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted.
The world of hacking is a world of pain and frustration. Frustration for the hacker as
he tries to figure out how to break the latest and greatest security device, and pain for
the manufacturer or corporation that made or was relying on that device.
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...
Penetration testing is often considered an art as much as it is a science, but even an
artist needs the right brushes to do the job well. Many commercial and open source
tools exist for performing penetration testing, but it’s often hard to ensure that you
know what tools are available and which ones to use for a certain task....
I am not an expert. I have never claimed to be an expert at anything
(at least not seriously done so), least of all an expert in forensic
analysis. I am not an expert in Windows Registry analysis. I am
simply, by profession, a responder and analyst with some work
and research experience in this area. I have also performed a
number...
LEGO has been a part of my life since I was about four years old. My first sets were basic
LEGO SYSTEM sets. However, I soon lumped to the early TECHNIC sets that were
beginning to appear on the market. Because I was one of those kids who had to take everything
apart to figure out how it worked, TECHNIC seemed like a good fit for me....
"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...