Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)

Buy
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement each other. Jennifer Bayuk is an information security management and information technology due diligence expert, experienced in virtually every aspect of the field of information security. She specializes in security roadmaps, and is engaged in a wide variety of industries with projects ranging from technical architecture requirements to security governance. She has been a Wall Street chief information security officer, a manager of information systems internal audit, a Price Waterhouse security principal consultant and auditor, and a security software engineer at AT&T Bell Laboratories. She has authored two textbooks for the Information Systems Audit and Control Association: Stepping through the IS Audit and Stepping through the InfoSec Program, and a third book on Enterprise Security for the Executive, Setting the Tone from the Top, published by Praeger. In addition to editing this Springer edition on CyberForensics, Jennifer has co-edited a collection of works on Enterprise Information Security and Privacy for Artech House. She is a sought-after speaker and an industry professor at Stevens Institute of Technology.
(HTML tags aren't allowed.)

MCSE Training Kit (Exam 70-228): Microsoft® SQL Server™ 2000 System Administration
MCSE Training Kit (Exam 70-228): Microsoft® SQL Server™ 2000 System Administration

Official Microsoft study guide for the skills you need on the job—and on the exam.

Learn how to deliver exceptional performance and scalability to your business information systems—and prepare for the Microsoft® Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your...

Financial Analysis Tools and Techniques: A Guide for Managers
Financial Analysis Tools and Techniques: A Guide for Managers
This volume is an adaptation for the professional market of the most recent 10th (“millennium”) edition of Dr. Helfert’s best-selling Techniques of Financial Analysis, which, with more than half a million copies in print over the past 38 years, has given the student, analyst, and business executive a concise, practical, usable,...
Pinnacle Studio 9 Ignite!
Pinnacle Studio 9 Ignite!
Covering the popular video editing and DVD authoring software that is used by 3.5 million users, "Pinnacle Studio 9 Ignite!" is a visual guide that will have you up and running in no time. With the many enhancements of Pinnacle Studio 9, this book is not only suitable for beginners, but also for users of Pinnacle looking to brush up on...

Web-Based Control and Robotics Education (Intelligent Systems, Control and Automation: Science and Engineering)
Web-Based Control and Robotics Education (Intelligent Systems, Control and Automation: Science and Engineering)

The development of the Internet and World Wide Web technology has motivated the introduction of new ways for distance learning and education. This book provides a timely and cohesive set of contributions that present methodologies, technologies and practical tools for teaching control and robotic systems analysis and design over the Web. It...

DB2(R) Universal Database V8.1 Certification Exams 701 and 706 Study Guide
DB2(R) Universal Database V8.1 Certification Exams 701 and 706 Study Guide
The official in-depth guide to passing IBM's DB2 Universal Database Version 8.1 Certification Exams 701 and 706

Over 20,000 people test to become IBM Certified Database Administrators every year. Some will pass, many will not. This book is IBM's official companion to mastering the skills that you need to ensure that you pass Certification...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy