Related Books
Language: en
Pages: 744
Pages: 744
Type: BOOK - Published: 2010-09-29 - Publisher: John Wiley & Sons
A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of mal
Language: en
Pages: 289
Pages: 289
Type: BOOK - Published: 2012-12-28 - Publisher: Newnes
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on anoth
Language: en
Pages: 1510
Pages: 1510
Type: BOOK - Published: 2014-03-17 - Publisher: John Wiley & Sons
Defend your networks and data from attack with this unique two-book security set The Attack and Defend Computer Security Set is a two-book set comprised of the
Language: en
Pages: 912
Pages: 912
Type: BOOK - Published: 2014-07-22 - Publisher: John Wiley & Sons
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve di
Language: en
Pages: 937
Pages: 937
Type: BOOK - Published: 2009-05-04 - Publisher: Jones & Bartlett Publishers
With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach tha