Narrow your search
Listing 1 - 10 of 18 << page
of 2
>>
Sort by
Scene of the cybercrime.
Authors: ---
ISBN: 1281716871 9786611716875 0080486991 1597492760 9780080486994 9781597492768 9781281716873 6611716874 Year: 2008 Publisher: Burlington, MA : Syngress Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of ""Scene of the Cybercrime"" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement

Scene of the cybercrime : computer forensics handbook
Authors: ---
ISBN: 1281056057 9786611056056 0080480780 1931836655 193226633X 9781932266337 9780080480787 9781931836654 Year: 2002 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."" - Hans Christian Krüger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why tha

Scene of the cybercrime : computer forensics handbook
Authors: ---
ISBN: 193226633X 9781932266337 9780080480787 0080480780 9781931836654 1931836655 1281056057 9786611056056 Year: 2002 Publisher: Rockland, MA Syngress Pub

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."" - Hans Christian Krüger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why tha


Digital
Scene of the cybercrime
Authors: ---
ISBN: 9780080486994 0080486991 1281716871 9781281716873 9786611716875 6611716874 Year: 2008 Publisher: Burlington, MA Syngress Pub

Loading...
Export citation

Choose an application

Bookmark

Abstract

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard. Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws. * Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations. * Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard * Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones.

How to cheat at configuring ISA server 2004
Authors: ---
ISBN: 9781597490573 1597490571 1429413271 9781429413275 1597490970 9781597490979 9780080488950 0080488951 1281035688 9786611035686 Year: 2006 Publisher: Rockland, Mass Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books tw

Windows server 2012 security from end to edge and beyond : architecting, designing, planning, and deploying Windows server 2012 security solutions
Authors: --- --- ---
ISBN: 9786611035907 1597499811 1281035904 008048896X 1597499803 1299530273 1597492434 9781597492430 9780080488967 9780080488967 9781597499811 9781597499804 9781281035905 Year: 2013 Publisher: Amsterdam : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft

Dr. Tom Shinder's ISA server 2006 migration guide
Authors: --- ---
ISBN: 1281055727 9786611055721 0080555519 1597491993 9781597491990 9780080555515 9781281055729 661105572X Year: 2007 Publisher: Burlington, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.* Learn to Publish Exchange

Configuring ISA server 2000 : building firewalls for windows 2000
Authors: --- ---
ISBN: 1928994296 9786611052874 1281052876 0080476775 9781928994299 Year: 2001 Publisher: Rockland, Mass. ; [Great Britain] : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Microsoft's flagship ISA Server delivers the Internet to your customers!As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance. ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and speed.Written by best-selling author of several MCSE 2000 study guides, this book will provide the system administrators

Dr. Tom Shinder's configuring ISA Server 2004
Authors: --- ---
ISBN: 1597490121 9781597490122 9781931836197 1931836191 9786611055912 1281055913 0080477402 9780080477404 Year: 2005 Publisher: Rockland, Mass. : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product ""Configuring ISA Server 2000"" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.<

Best damn firewall book period
Authors: --- --- ---
ISBN: 1928994938 9781928994930 9781931836906 1931836906 0080476066 9780080476063 9786611056155 1281056154 Year: 2003 Publisher: Rockland, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ,

Listing 1 - 10 of 18 << page
of 2
>>
Sort by