The Virtual Bookcase : Shelf Computer security
Security of computer systems
Shelf parts : First Previous Next Last
Review:
The preface states, correctly, that there is little information for
the forensic investigator on the topic of file system structures and
internals that are useful for providing direction on tracing and
tracking information on the disk. The author also notes that there
are a number of worthwhile texts that address the general topic of
investigation. Therefore, the author intends to address the former
rather than the latter. At the same time, there is an implication in
the initial section that this work is only the merest introduction to
the subject of computer forensics.
Part one is aimed at providing foundational concepts. Chapter one, in
fact, does provide a quick review of the investigation process, and a
list of forensic software t...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of File System Forensic Analysis
Book descriptionFrom the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be approaching management for funding in the next year or two to procure intrusion prevention devices, especially Intelligent switches from 3Com (TippingPoint), as well as host-based intrusion prevention solutions like Cisco Security Agent, Platform Logic, Ozone or CrossTec. Both managers and security technologists face a pressing need to get up to speed, and fast, on the commercial and open source intrusion prevention solutions. T...
Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Intrusion Prevention and Active Response : Deploying Network and Host IPS
Book descriptionThis is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337 language. 1337 h4x0r h4ndb00k will also review the nature of computer viruses, different practical jokes to play on your desktop and tips on how to live the hacker lifestyle. Join the elite society of computer hackers with 1337 h4x0r h4ndb00k as your guide.
About the Author
h4x0r h4ndb00kabout the author hello, my name is tapeworm, and i am a freelance contract hacker amongst other things. the first thing i ever learned about comput...
Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of 1337 h4x0r h4ndb00k
Review:
The preface states that the audience for the book is comprised of
developers (particularly those interested in secure software),
security professionals (in places), managers (in places), and
academics (there are a couple of chapters that indicate where further
research might be useful). McGraw also introduces the major
components of the book. His "thee pillars" are not the usual
confidentiality, integrity and availability, but risk management,
"touchpoints," and knowledge. The touchpoints are code analysis, risk
analysis, penetration (vulnerability) testing, security tests, abuse
cases, security requirements, and security operations.
Part one outlines the basics of software security. Chapter one
informs us that problems exist in softw...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Software Security : Building Security In
Shelf parts : First Previous Next Last