|
|
|
|
|
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and
are constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploiting
them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer
security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such
as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus
software. Hackers have proven their dedication and ability to systematically penetrate networks all over the
world. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system,
steal everything of value, and completely erase their tracks in less than 20 minutes!
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of five books covering a broad base of topics in Computer Hacking Forensic Investigation, designed to expose the reader to the process of detecting attacks and collecting evidence in a forensically sound manner with the intent to report crime and prevent future attacks. Learners are introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. In full, this and the other four books provide preparation to identify evidence in computer related crime and abuse cases as well as track the intrusive hacker's path through a client system. The series and accompanying labs help prepare the security student or professional to profile an intruder's footprint and gather all necessary information and evidence to support prosecution in a court of law. Hard Disks, File and Operating Systems provides a basic understanding of file systems, hard disks and digital media devices. Boot processes, Windows and Linux Forensics and application of password crackers are all discussed. |
|
|
|
MVVM Survival Guide for Enterprise Architectures in Silverlight and WPF
Rich client development remains one of the most popular forms of application
development, both from a user and a developer point of view. While nobody denies
the importance of thin-client interface technologies such as HTML(5), it is clear
that consumers and enterprises alike enjoy using applications that provide a rich,... | | | | Web 2.0 Principles and Best Practices (O'Reilly Radar)Web 2.0 is here today and yet its vast, disruptive impact is just beginning. More than just the latest technology buzzword, it's a transformative force that's propelling companies across all industries towards a new way of doing business characterized by user participation, openness, and network effects. What does Web 2.0 mean to your company... |
|
|