Hacking Exposed Computer Forensics, 2nd Edition

Hacking Exposed Computer Forensics, 2nd Edition

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how…

Hacking Exposed Malware and Rootkits

Hacking Exposed Malware and Rootkits

Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the “black art” of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings – all…

Hacking Exposed, 6th Edition

Hacking Exposed, 6th Edition

Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested “attack-countermeasure” philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker’s extensive arsenal. New and updated material!

Practical Intrusion Analysis

Practical Intrusion Analysis

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for…

Security Monitoring

Security Monitoring

How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network — first by teaching you which assets you need to monitor closely, and then by helping you…

The Myths of Security

The Myths of Security

If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The…

Hacking Exposed Linux, 3rd Edition

Hacking Exposed Linux, 3rd Edition

This authoritative guide will help you secure your Linux network – whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team…

Hacking VoIP

Hacking VoIP

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it’s notoriously lacking in security. With minimal effort, hackers can eavesdrop…

Hacking, 2nd Edition

Hacking, 2nd Edition

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how…