Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery [...]
Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab.[...]
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure - everything from the power grid to water treatment, chemical manufacturing to transportation. This book addresses security issues affecting SCA[...]
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. "Low Tech Ha[...]