BookDL - 17 new Books |
- Digital Forensics Processing and Procedures
- X-Ways Forensics Practitioner’s Guide
- Violent Python
- Unified Communications Forensics
- Professional Penetration Testing, 2nd Edition
- Windows Server 2012 Security from End to Edge and Beyond
- Windows 2012 Server Network Security
- Risk Management Framework
- Simple Steps to Data Encryption
- Job Reconnaissance
- Hacking with Kali
- The Basics of IT Audit
- The Wireshark Field Guide
- The Basics of Web Hacking
- The Basics of Cloud Computing
- The Basics of Hacking and Penetration Testing, 2nd Edition
- The Basics of Digital Privacy
Digital Forensics Processing and Procedures Posted: 22 Apr 2014 07:17 PM PDT This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides […] The post Digital Forensics Processing and Procedures appeared first on BookDL. |
X-Ways Forensics Practitioner’s Guide Posted: 22 Apr 2014 07:10 PM PDT The X-Ways Forensics Practitioner’s Guide is more than a manual-it’s a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner’s Guide, the authors […] The post X-Ways Forensics Practitioner's Guide appeared first on BookDL. |
Posted: 22 Apr 2014 07:05 PM PDT Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract […] The post Violent Python appeared first on BookDL. |
Unified Communications Forensics Posted: 22 Apr 2014 07:01 PM PDT Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on […] The post Unified Communications Forensics appeared first on BookDL. |
Professional Penetration Testing, 2nd Edition Posted: 22 Apr 2014 08:30 AM PDT Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking […] The post Professional Penetration Testing, 2nd Edition appeared first on BookDL. |
Windows Server 2012 Security from End to Edge and Beyond Posted: 22 Apr 2014 08:23 AM PDT Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems […] The post Windows Server 2012 Security from End to Edge and Beyond appeared first on BookDL. |
Windows 2012 Server Network Security Posted: 22 Apr 2014 08:17 AM PDT Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS […] The post Windows 2012 Server Network Security appeared first on BookDL. |
Posted: 22 Apr 2014 08:11 AM PDT The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes […] The post Risk Management Framework appeared first on BookDL. |
Simple Steps to Data Encryption Posted: 22 Apr 2014 08:04 AM PDT Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious […] The post Simple Steps to Data Encryption appeared first on BookDL. |
Posted: 22 Apr 2014 07:56 AM PDT There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people’s limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a […] The post Job Reconnaissance appeared first on BookDL. |
Posted: 21 Apr 2014 02:33 PM PDT Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure […] The post Hacking with Kali appeared first on BookDL. |
Posted: 21 Apr 2014 08:56 AM PDT The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form […] The post The Basics of IT Audit appeared first on BookDL. |
Posted: 21 Apr 2014 08:52 AM PDT The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world’s foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide […] The post The Wireshark Field Guide appeared first on BookDL. |
Posted: 21 Apr 2014 08:48 AM PDT The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a “path of least resistance” that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect […] The post The Basics of Web Hacking appeared first on BookDL. |
Posted: 21 Apr 2014 08:42 AM PDT As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware […] The post The Basics of Cloud Computing appeared first on BookDL. |
The Basics of Hacking and Penetration Testing, 2nd Edition Posted: 21 Apr 2014 08:35 AM PDT The Basics of Hacking and Penetration Testing, 2nd Edition serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are […] The post The Basics of Hacking and Penetration Testing, 2nd Edition appeared first on BookDL. |
Posted: 21 Apr 2014 02:30 AM PDT Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while […] The post The Basics of Digital Privacy appeared first on BookDL. |
You are subscribed to email updates from BookDL To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
Tidak ada komentar:
Posting Komentar