Christopher L. Bell,Michael Boucher,F. William Brownell,Ronald E. Cardwell,Kevin Collins,Andrew Davis,Jeff Holmstead,Jason B. Hutt,Jessica O. King,Stanley W. Landfair
(1)
Dave Kleiman (EDT)/ Kevin Cardwell (EDT)/ Timothy Clinton (EDT)/ Michael Cross (EDT)/ Michael Gregg (EDT)
(1)
Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to i
Bots: How to Detect and Prevent Them is a concise overview of the malicious behavior and threats posed by Bots to Internet and network security. Bots are automated software programs used to browse the
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the applicati
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal prof