Operating System Forensics
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such […]
Read MoreMicrosoft Azure Security Infrastructure (It Best Practices – Microsoft Pres…
Malicious Mobile Code: Virus Protection for Windows
Malicious Mobile Code This text provides the strategies, tips and tricks needed to secure a Windows system from viruses. It teaches what viruses can and cannot do and how to recognize, remove, and prevent them. Full description
Read MoreWindows Server 2012 Security from End to Edge and Beyond: Architecting, Des…
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems […]
Read MoreInformation Security Policy Development for Compliance: ISO/IEC 27001, NIST…
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory […]
Read MoreQuantum Information Theory
Developing many of the major, exciting, pre- and post-millennium developments from the ground up, this book is an ideal entry point for graduate students into quantum information theory. Significant attention is given to quantum mechanics for quantum information theory, and careful studies of the important protocols of teleportation, superdense coding, and entanglement distribution are presented. […]
Read MoreThe Ultimate Password Protector: A Password Organizer and Journal
Having trouble keeping track of your passwords? Then this organizer is for you! Write your usernames and passwords here, and keep them away from hackers who might invade your computer. This is also an excellent place to record your passwords in case something happens to you and a loved one needs to access your information, […]
Read MoreA Concise Introduction to GDPR
A concise, introductory guide to the EU General Data Protection Regulation (GDPR).
Read More