Sabtu, 11 Mei 2013

Wow! eBook: Federated Identity Primer - 6 new eBooks


Wow! eBook: Federated Identity Primer - 6 new eBooks

Link to Wow! eBook

Federated Identity Primer

Posted: 11 May 2013 10:47 AM PDT

Book Description

Identity authentication and authorization are integral tasks in today’s digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree

  • Explains the concepts of digital identity
  • Describes the technology behind and implementation of federated identity systems
  • Helps you decide if federated identity is good for your system or web service

Table of Contents
Chapter 1. Introduction to Identity
Chapter 2. What Is Federated Identity?
Chapter 3. Federated Identity Technologies
Chapter 4. Deployment Options

About the Author
Derrick Rountree (CISSP, CASP, MCSE) has been in the IT field for almost 20 years. He has a Bachelors of Science in Electrical Engineering. Derrick has held positions as a network administrator, IT consultant, a QA engineer, and an Enterprise Architect. He has experience in network security, operating system security, application security, and secure software development. Derrick has contributed to several other Syngress and Elsevier publications on Citrix, Microsoft, and Cisco technologies.

Book Details

  • Paperback: 96 pages
  • Publisher: Syngress (December 2012)
  • Language: English
  • ISBN-10: 0124071899
  • ISBN-13: 978-0124071896
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Federated Identity Primer appeared first on Wow! eBook.

Cybercrime Investigative Case Management

Posted: 11 May 2013 10:43 AM PDT

Book Description

Investigative Case Management is a “first look” excerpted from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

Table of Contents

  1. Basic Case Tracking
  2. The Case Name
  3. Note Taking
  4. Analyzing Your Notes
  5. Analysis with Spreadsheets
  6. Analysis with Databases
  7. Analysis Using Charts
  8. Analysis Using Maps
  9. Fresh Set of Eyes
  10. Summary

Book Details

  • Paperback: 28 pages
  • Publisher: Syngress (December 2012)
  • Language: English
  • ISBN-10: 0124095062
  • ISBN-13: 978-0124095069
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Cybercrime Investigative Case Management appeared first on Wow! eBook.

Cybercrime Investigation Case Studies

Posted: 11 May 2013 10:40 AM PDT

Book Description

Cybercrime Investigation Case Studies is a “first look” excerpt from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This “first look” teaches you how to place the suspect behind the keyboard using case studies.

Table of Contents

  1. Introduction
  2. A Day in the Life of a Cybercriminal
  3. The Life and Casework of a Cyber Investigator
  4. Testifying to Your Work
  5. Summar

About the Author
Brett Shavers is a former law enforcement officer of a municipal police department. He has been an investigator assigned to state and federal task forces. Besides working many specialty positions, Brett was the first digital forensics examiner at his police department, attended over 2000 hours of forensic training courses across the country, collected more than a few certifications along the way, and set up the department’s first digital forensics lab in a small, cluttered storage closet.

Brett has been an adjunct instructor at the University of Washington’s Digital Forensics Program, an expert witness and digital forensics consultant, a prolific speaker at conferences, a blogger on digital forensics, and is an honorary member of the Computer Technology Investigators Network. Brett has worked cases ranging from child pornography investigations as a law enforcement investigator to a wide range of civil litigation cases as a digital forensics expert consultant. And even though it’s been more than two decades since wearing the uniform, he’s still a Marine.

Book Details

  • Paperback: 48 pages
  • Publisher: Syngress (December 2012)
  • Language: English
  • ISBN-10: 0124095054
  • ISBN-13: 978-0124095052
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Cybercrime Investigation Case Studies appeared first on Wow! eBook.

Cybercrime Case Presentation

Posted: 11 May 2013 10:35 AM PDT

Book Description

Cybercrime Case Presentation is a “first look” excerpt from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they observed the case as it happened.

Table of Contents

  1. Introduction
  2. It's Not Whether You Win or Lose
  3. Investigative Mindset
  4. Your Audience
  5. Preparation
  6. Organizing Case Information
  7. Value of Visuals
  8. The Suspect's Machine
  9. Analogies
  10. Avoid Too Much Information
  11. Your Presentation
  12. Summary

Book Details

  • Paperback: 32 pages
  • Publisher: Syngress; 1 edition (January 2, 2013)
  • Language: English
  • ISBN-10: 0124095046
  • ISBN-13: 978-0124095045
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Cybercrime Case Presentation appeared first on Wow! eBook.

Blackhatonomics

Posted: 11 May 2013 10:29 AM PDT

Book Description

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cybersecurity in the inner circle of cybercrime is analyzed from the impact of multiple. Written by an exceptional author team, they take practical academic principles back them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.

  • Historical perspectives of the development of malware as it evolved into a viable economic endeavour
  • Country specific cyber-crime analysis of the United States, China, and Russia, as well as an analysis of the impact of Globalization on cyber-crime.
  • Presents the behind the scenes methods used to successfully execute financially motivated attacks in a globalized cybercrime economy.
  • Provides unique insights, analysis, and useful tools for justifying corporate information security budgets.
  • Provides multiple points of view, from pure research, to corporate, to academic, to law enforcement.
  • Includes real world cybercrime case studies and profiles of high-profile cybercriminals.

Table of Contents
Chapter 1. Psychological and Cultural Trends
Chapter 2. Seasons of Change
Chapter 3. Drivers and Motives
Chapter 4. Signal-to-Noise Ratio
Chapter 5. Execution
Chapter 6. From Russia with Love
Chapter 7. The China Factor
Chapter 8. Pawns and Mules
Chapter 9. Globalization
Chapter 10. America, Land of Opportunity
Chapter 11. Global Law Enforcement
Chapter 12: The Road Ahead

Book Details

  • Paperback: 216 pages
  • Publisher: Syngress (December 2012)
  • Language: English
  • ISBN-10: 1597497401
  • ISBN-13: 978-1597497404
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Blackhatonomics appeared first on Wow! eBook.

Network Intrusion Analysis

Posted: 11 May 2013 10:20 AM PDT

Book Description

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation.

Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response.

Network Intrusion Analysis addresses the entire process of investigating a network intrusion by:

  • Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion.
  • Providing real-world examples of network intrusions, along with associated workarounds.
  • Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation.

Table of Contents
Chapter 1. Intrusion Analysis Methodology
Chapter 2. Intrusion Methodologies and Artifacts
Chapter 3. Incident Response
Chapter 4. Volatile Data Analysis
Chapter 5. Network Analysis
Chapter 6. Host-Based Analysis
Chapter 7. Malware Analysis
Chapter 8. Finalizing the Analysis

Book Details

  • Paperback: 252 pages
  • Publisher: Syngress (November 2012)
  • Language: English
  • ISBN-10: 1597499625
  • ISBN-13: 978-1597499620
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Network Intrusion Analysis appeared first on Wow! eBook.

Tidak ada komentar:

Posting Komentar