A thorough resource for forensic investigators, this book covers a variety of methods and techniques for locating and analyzing digital evidence found on modern Linux systems after a security incident or cyberattack. Readers will learn how Linux wor...Daugiau...
No IT Manager or worker enjoys being woken in the middle of the night over a system fault. But arguably the worst way to be woken up in the middle of the night is over a situation where data loss has occurred -- and the recovery is going wrong....Daugiau...
Part of any modern defensive IT strategy for a business is guaranteeing data recoverability. Will you, as a busy IT manager, sleep well at night knowing you have a comprehensive plan to enable data recovery? This book focuses on what you need to do t...Daugiau...
This book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. Youll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report....Daugiau...
A thorough resource for forensic investigators, this book covers a variety of methods and techniques for locating and analyzing digital evidence found on modern Linux systems after a security incident or cyberattack. Readers will learn how Linux wor...Daugiau...
If you had to evacuate from your building right now and were told you couldnt get back in for two weeks, would you know what to do to ensure your business continues to operate? Would your staff? Would every person who works for your organization?...Daugiau...
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficie...Daugiau...
National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Cyber Resilience Workshop Series, Lynette I. Millett, Anne Frances Johnson
The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations fro...Daugiau...
A missing laptop, a petulant critic, a sojourn in communal living—Eleanor, or, The Rejection of the Progress of Love is a bracingly intelligent examination of grief, autonomy, aging, desire, information overload, and the condit...Daugiau...
Wallace and Webber explain how business executives can create and implement a plan to keep the business going after a disaster by helping minimize the damage. Their topics include building the business case: measuring the impact on the business,...Daugiau...
This essential guide covers the basics of planning to safeguard your librarys digital assetslibrary catalog and circulation data, online resources, etc.by taking advantage of cloud-based storage. Describes strategies that enable li...Daugiau...
Serija: Synthesis Lectures on Information Security, Privacy, and Trust
(Išleidimo metai: 30-Dec-2016, Paperback / softback, Leidėjas: Morgan and Claypool Life Sciences, ISBN-13: 9781627059596)
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is t...Daugiau...
Forensic image acquisition is an important part of post-mortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases, examine organizationa...Daugiau...