rssHome » Security and Encryption

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems,...

eBook Details:

  • Paperback: 350 pages
  • Publisher: WOW! eBook; 1st edition (November 23, 2012)
  • Language: English
  • ISBN-10: 1597497436
  • ISBN-13: 978-1597497435

eBook Description:

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

  • Review of the latest data hiding techniques presented at world-renownded conferences
  • Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7
  • Dives deep into the less known approaches to data hiding, covert communications, and advanced malware
  • Includes never before published information about next generation methods of data hiding
  • Outlines a well-defined methodology for countering threats
  • Looks ahead at future predictions for data hiding

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. CLICK TO DOWNLOAD

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Te...

eBook Details:

  • Paperback: 296 pages
  • Publisher: WOW! eBook; 3rd edition (February 10, 2012)
  • Language: English
  • ISBN-10: 1597497274
  • ISBN-13: 978-1597497275

eBook Description:

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7

  • Complete coverage and examples on Windows 7 systems
  • Contains Lessons from the Field, Case Studies, and War Stories
  • Companion online material, including electronic printable checklists, cheat sheets, free custom tools, and walk-through demos

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7

Now in its third edition, Harlan Carvey has updated Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7 to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, free cheat sheets, free custom tools, and walk-through demos. This third edition complements Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7, which focuses primarily on XP. CLICK TO DOWNLOAD

Information Security Risk Assessment Toolkit: Practical Assessments th...

eBook Details:

  • Paperback: 278 pages
  • Publisher: WOW! eBook; 1st edition (November 9, 2012)
  • Language: English
  • ISBN-10: 1597497355
  • ISBN-13: 978-1597497350

eBook Description:

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

  • Based on authors’ experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. CLICK TO DOWNLOAD

UTM Security with Fortinet: Mastering FortiOS

eBook Details:

  • Paperback: 452 pages
  • Publisher: WOW! eBook; 1st edition (December 11, 2012)
  • Language: English
  • ISBN-10: 1597497479
  • ISBN-13: 978-1597497473

eBook Description:

UTM Security with Fortinet: Mastering FortiOS

  • Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
  • Presents topics that are not covered (or are not covered in detail) by Fortinet’s documentation
  • Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. UTM makes network security less complex, cheaper, besides more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet’s FortiGate in the enterprise.

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. UTM makes network security less complex, cheaper, besides more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet’s FortiGate in the enterprise. CLICK TO DOWNLOAD

SQL Injection Attacks and Defense, Second Edition

eBook Details:

  • Paperback: 576 pages
  • Publisher: WOW! eBook; 2nd edition (July 2, 2012)
  • Language: English
  • ISBN-10: 1597499633
  • ISBN-13: 978-1597499637

eBook Description:

SQL Injection Attacks and Defense, 2nd Edition

  • SQL Injection Attacks and Defense, Second Edition is the only book to provide a complete understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures.
  • Covers unique, publicly unavailable information, by technical experts in such areas as Oracle, Microsoft SQL Server, and MySQL including new developments for Microsoft SQL Server 2012 (Denali).
  • Written by an established expert, author, and speaker in the field, with contributions from a team of equally renowned creators of SQL injection tools, applications, and educational materials.

SQL Injection Attacks and Defense, Second Edition is the only book devoted exclusively to this long-established but recently growing threat. This is the definitive resource for understanding, finding, exploiting, and defending against this increasingly popular and particularly destructive type of Internet-based attack.

SQL Injection Attacks and Defense, Second Edition includes all the currently known information about these attacks and significant insight from its team of SQL injection experts. CLICK TO DOWNLOAD