Augmented Reality
With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade’s most disruptive technologies, as the information...
13 May, 2013
With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade’s most disruptive technologies, as the information...
11 May, 2013
Identity authentication and authorization are integral tasks in today’s digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity...
11 May, 2013
Investigative Case Management is a “first look” excerpted from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of...
11 May, 2013
Cybercrime Investigation Case Studies is a “first look” excerpt from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both...
11 May, 2013
Cybercrime Case Presentation is a “first look” excerpt from Brett Shavers’ new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order...
Business & Management / Security
11 May, 2013
Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cybersecurity in the inner circle of...
11 May, 2013
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a...
10 May, 2013
Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system,...
Business & Management / Networking / Security
10 May, 2013
If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its...
Cloud Computing / Networking / Security
10 May, 2013
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy,...
More