Category: Security

Placing the Suspect Behind the Keyboard 0

Placing the Suspect Behind the Keyboard

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner’s work...

Augmented Reality 0

Augmented Reality

With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade’s most disruptive technologies, as the information...

Federated Identity Primer 0

Federated Identity Primer

Identity authentication and authorization are integral tasks in today’s digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity...

Cybercrime Investigative Case Management 0

Cybercrime Investigative Case Management

Investigative Case Management is a “first look” excerpted from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of...

Cybercrime Investigation Case Studies 0

Cybercrime Investigation Case Studies

Cybercrime Investigation Case Studies is a “first look” excerpt from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both...

Cybercrime Case Presentation 0

Cybercrime Case Presentation

Cybercrime Case Presentation is a “first look” excerpt from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order...

Blackhatonomics 0

Blackhatonomics

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cybersecurity in the inner circle of...

Network Intrusion Analysis 0

Network Intrusion Analysis

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a...

Logging and Log Management 0

Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system,...