Listing 1 - 7 of 7 |
Sort by
|
Choose an application
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
Choose an application
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most abou
Computer networks --- Computer security --- Computer viruses. --- Security measures. --- Management. --- Software viruses --- Viruses, Computer --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer crimes --- Malware (Computer software) --- Information Technology --- General and Others
Choose an application
E-mail configuration for the System Administrator.Windows 2000 users will find Configuring Exchange Server 2000 valuable for its coverage of all the popular e-mail clients, such as Outlook and Outlook Express. In addition, System and E-Mail Administrators will find the coverage of large system E-Mail Providers such as Exchange indispensable.Configuring Exchange Server 2000 focuses on e-mail configuration from the standpoint of the system administrator. It covers installation and management of all the major email programs, as well as covering mobile email, web-based email, email
Client/server computing. --- Microsoft Exchange server. --- Computing, Client/server --- Microsoft Exchange 2000 --- Electronic data processing --- Distributed processing --- Computer viruses. --- Electronic mail systems --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Security measures.
Choose an application
This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of ""Centralized Antivirus Management."" For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.Configuring Symantec AntiVirus Enter
Computer viruses. --- Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Software viruses --- Viruses, Computer --- Security measures --- Protection of computer systems --- Protection --- Computer security --- Data protection --- Security systems --- Hacking --- Computer crimes --- Malware (Computer software)
Choose an application
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised
Computer security. --- Computer viruses --- Computer crimes --- Investigation. --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- Criminal investigation --- Software viruses --- Viruses, Computer --- Malware (Computer software) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Information Technology --- General and Others
Choose an application
Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat
Computer viruses. --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Protection --- Security measures --- Information Technology --- General and Others
Choose an application
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides , a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists. A condensed hand-held guide complete with on-the-job tasks and checklists Specific for Windows-based systems, the largest running OS in the world Authors are world-renowned leaders in investigating and analyzing malicious code
Malware (Computer software) --- Computer viruses. --- Computer security. --- Computer crimes --- Investigation. --- Microsoft Windows (Computer file) --- Computer viruses --- Computer security --- Forensic sciences --- Linux --- Information Technology --- General and Others --- Criminalistics --- Forensic science --- Science --- Criminal investigation --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software viruses --- Viruses, Computer --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Protection --- Security measures --- Slackware Linux --- SUSE Linux --- Windows (Computer file) --- Chicago (Computer file) --- Microsoft Windows 95 --- Windows 95 --- Microsoft Windows CE --- Windows CE --- Pegasus (Computer file) --- Windows for workgroups --- Microsoft Windows for workgroups --- Windows 98 --- Microsoft Windows 98 --- Windows 2000 professional --- Windows 2000 --- Microsoft Windows 2000 --- Microsoft Windows Me millennium edition --- Windows Me --- Microsoft Windows XP (Computer file) --- Windows XP --- Microsoft Windows Vista --- Windows Vista --- Microsoft Windows 7 --- Windows 7 --- Windows 8 --- Windows 10 --- Investigation
Listing 1 - 7 of 7 |
Sort by
|