Narrow your search
Listing 1 - 5 of 5
Sort by

Book
Le business de la cybercriminalité
Authors: ---
ISBN: 2746210541 Year: 2005 Publisher: Paris : Hermès Sciences,


Book
De staatsveiligheid.Essays over 175 jaar Veiligheid van de Staat.La sûreté.Essais sur les 175 ans de la Sûreté de l'Etat
Authors: --- --- --- ---
Year: 2005 Publisher: Brussel/Bruxelles Uitgeverij Politeia Editions

Loading...
Export citation

Choose an application

Bookmark

Abstract

Forensic discovery
Authors: ---
ISBN: 020163497X Year: 2005 Publisher: Upper Saddle River, NJ : Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

« The Definitive Guide to Computer Forensics: Theory and Hands-On Practice. Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject. Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever. The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins. » [Publisher]

Hardening Linux
Author:
ISBN: 1280656433 9786610656431 1430200057 1590594444 9781590594445 Year: 2005 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks. The book is written for Linux/UNIX administrators who do not necessarily have in-depth knowledge of security but need to know how to secure their networks.

Keywords

Linux device drivers (Computer programs) --- Computer security. --- Operating systems (Computers) --- Software maintenance. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer program maintenance --- Computer programs --- Computer software --- Maintenance, Software --- Software revision --- Computer programming --- Software reengineering --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Device drivers (Computer programs) --- Maintenance --- Operating systems --- Protection --- Security measures --- Open source software. --- Computer programming. --- Software engineering. --- Open Source. --- Software Engineering/Programming and Operating Systems. --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Free software (Open source software) --- Open code software --- Opensource software --- Programming --- Software maintenance --- Linux, Pilotes de périphérique pour (logiciels) --- Réseaux d'ordinateurs --- Logiciels --- Systèmes d'exploitation (ordinateurs) --- Mesures de sûreté --- Linux, Pilotes de périphérique pour (logiciels) --- Réseaux d'ordinateurs --- Systèmes d'exploitation (ordinateurs) --- Mesures de sûreté

Listing 1 - 5 of 5
Sort by