Rabu, 23 April 2014

BookDL - 17 new Books


BookDL - 17 new Books

Link to BookDL

Digital Forensics Processing and Procedures

Posted: 22 Apr 2014 07:17 PM PDT

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides […]

The post Digital Forensics Processing and Procedures appeared first on BookDL.

X-Ways Forensics Practitioner’s Guide

Posted: 22 Apr 2014 07:10 PM PDT

The X-Ways Forensics Practitioner’s Guide is more than a manual-it’s a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner’s Guide, the authors […]

The post X-Ways Forensics Practitioner's Guide appeared first on BookDL.

Violent Python

Posted: 22 Apr 2014 07:05 PM PDT

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract […]

The post Violent Python appeared first on BookDL.

Unified Communications Forensics

Posted: 22 Apr 2014 07:01 PM PDT

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on […]

The post Unified Communications Forensics appeared first on BookDL.

Professional Penetration Testing, 2nd Edition

Posted: 22 Apr 2014 08:30 AM PDT

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking […]

The post Professional Penetration Testing, 2nd Edition appeared first on BookDL.

Windows Server 2012 Security from End to Edge and Beyond

Posted: 22 Apr 2014 08:23 AM PDT

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems […]

The post Windows Server 2012 Security from End to Edge and Beyond appeared first on BookDL.

Windows 2012 Server Network Security

Posted: 22 Apr 2014 08:17 AM PDT

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS […]

The post Windows 2012 Server Network Security appeared first on BookDL.

Risk Management Framework

Posted: 22 Apr 2014 08:11 AM PDT

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes […]

The post Risk Management Framework appeared first on BookDL.

Simple Steps to Data Encryption

Posted: 22 Apr 2014 08:04 AM PDT

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious […]

The post Simple Steps to Data Encryption appeared first on BookDL.

Job Reconnaissance

Posted: 22 Apr 2014 07:56 AM PDT

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people’s limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a […]

The post Job Reconnaissance appeared first on BookDL.

Hacking with Kali

Posted: 21 Apr 2014 02:33 PM PDT

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure […]

The post Hacking with Kali appeared first on BookDL.

The Basics of IT Audit

Posted: 21 Apr 2014 08:56 AM PDT

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form […]

The post The Basics of IT Audit appeared first on BookDL.

The Wireshark Field Guide

Posted: 21 Apr 2014 08:52 AM PDT

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world’s foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide […]

The post The Wireshark Field Guide appeared first on BookDL.

The Basics of Web Hacking

Posted: 21 Apr 2014 08:48 AM PDT

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a “path of least resistance” that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect […]

The post The Basics of Web Hacking appeared first on BookDL.

The Basics of Cloud Computing

Posted: 21 Apr 2014 08:42 AM PDT

As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware […]

The post The Basics of Cloud Computing appeared first on BookDL.

The Basics of Hacking and Penetration Testing, 2nd Edition

Posted: 21 Apr 2014 08:35 AM PDT

The Basics of Hacking and Penetration Testing, 2nd Edition serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are […]

The post The Basics of Hacking and Penetration Testing, 2nd Edition appeared first on BookDL.

The Basics of Digital Privacy

Posted: 21 Apr 2014 02:30 AM PDT

Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while […]

The post The Basics of Digital Privacy appeared first on BookDL.

Tidak ada komentar:

Posting Komentar