A Practical Guide
De som köpt den här boken har ofta också köpt Co-Intelligence av Ethan Mollick (häftad).
Köp båda 2 för 911 krNihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research on different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. Nihad focuses on computer forensics and anti-forensics techniques in Windows OS. He has completed numerous technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and anti-forensics techniques. Recently, he has shifted his focus toward digital privacy and security. Nihad has authored two books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and web security assessment. He covers different information security topics and related matters on his "DarknessGate" infosec blog. Nihad has a BSc honors degree in computer science from the University of Greenwich, United Kingdom. Rami Hijazi is the General Manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. He is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, eCommerce, Agile development, database design, and data handling analysis. Rami also works as consultant to Cyber Boundaries Inc. where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, as well as planning and development advice for IT departments concerning contingency planning.
Chapter 1: Introduction and Discussion of the Current Status of Online Privacy.- Chapter 2: Essential Privacy Tips.- Chapter 3: Windows Security.- Chapter 4: Online Anonymity.- Chapter 5: Cryptography and Secure Communication.- Chapter 6: What's Next.-