| This book deals with security from hostile computer forensics (mostly on one’s computer, but also on one’s digital camera, fax machine, and related computer-like electronics), as distinct from network forensics, which in this context is snooping into users’ online activities. Computer forensics deals with anything and everything that can be found on one’s computer. Network forensics, on the other hand, pertains to evidence like logs kept by Internet service providers (ISPs) and other remotely located networked computers. Network forensics is most relevant in the investigation of remote hackings, remote denial of service attacks, and the like. Even so, because most computers today are connected to the Internet at one time or another, this book also covers those aspects of network forensics that affect anyone connecting to the Internet.
All trademarks are hereby acknowledged as the property of their respective owners. |
|
|
Mastering Network SecurityThe new edition of the highly-acclaimed and best-selling Mastering Network Security is here, and just in time! The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security... | | Beginning iPhone 3 Development: Exploring the iPhone SDKAre you a programmer looking for a new challenge? Does the thought of building your very own iPhone app make your heart race and your pulse quicken? If so, Beginning iPhone 3 Development: Exploring the iPhone SDK is just the book for you. Updated and revised for iPhone SDK 3, many of the discussions in the original book have been clarified... | | |
|