Digital Forensics Basics

Digital Forensics Basics

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder’s footprints and to gather the necessary digital evidence in a forensically sound manner…

Mastering Ethereum

Mastering Ethereum

If you’re looking to get started with the Ethereum protocol–or are among the many open source developers, integrators, and system administrators already working with this platform–Mastering Ethereum is the definitive book on the topic. Ethereum represents the gateway to a worldwide, decentralized computing paradigm. This platform enables you to…

Cybersecurity Incident Response

Cybersecurity Incident Response

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don’t allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires…

Firewalls Don't Stop Dragons, 3rd Edition

Firewalls Don’t Stop Dragons, 3rd Edition

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You…

Pro iOS Security and Forensics

Pro iOS Security and Forensics

Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks. Managing…

Cracking Codes with Python

Cracking Codes with Python

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll…

Learning Kali Linux

Learning Kali Linux

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you…

Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals…