Categories Unlimited Books

Virtual Honeypots: From Botnet Tracking to Intrusion Detection

Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain.   In this […]

Read More
Categories Unlimited Books

Mobile Forensics: Advanced Investigative Strategies

Key Features A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience Book Description Investigating digital media is impossible without forensic […]

Read More
Categories Unlimited Books

Protection of Information and the Right to Privacy – A New Equilibrium? (La…

This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented […]

Read More
Categories Unlimited Books

IT Governance: An International Guide to Data Security and ISO27001/ISO2700…

For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range […]

Read More