Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
29
result(s) for
"Microsoft Windows (Computer file) Security measures."
Sort by:
Practical Mobile Forensics
by
Mahalik, Heather
,
Bommisetty, Satish
in
Cell phone systems
,
Cell phone systems-Security measures
,
Computer crimes
2018,2024
Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics, Second Edition and it delves into the concepts of mobile forensics and its importance in today's world.
Learning Malware Analysis
2018,2024
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics.
Windows forensic analysis : dvd toolkit
by
Carvey, Harlan
in
Computer crimes
,
Computer crimes - Investigation - United States - Methodology
,
Computer networks
2007
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. This book also brings this material to the doorstep of system administrators, who are often the front line troops when an incident occurs, but due to staffing and budgets do not have the necessary knowledge to effectively respond. All disc-based content for this title is now available on the Web.
Digital privacy and security using Windows : a practical guide
\"This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint ... The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird.\"--Page 4 of cover.
Practical mobile forensics
by
Mahalik, Heather
,
Bommisetty, Satish
,
Skulkin, Oleg
in
Android (Electronic resource)
,
Cell phone systems -- Security measures
,
iOS (Electronic resource)
2018
Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations. By the end of this book, you will have mastered the current operating systems and the relevant techniques to recover data from mobile devices by leveraging open source solutions.
Mastering Windows Network Forensics and Investigation
by
Steve Anson, Steve Bunting, Scott Pearson, Ryan Johnson
in
Computer crimes
,
Computer networks
,
Computer security
2012
An authoritative guide to investigating high-technology crimes
Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals.
* Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network
* Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response
* Walks you through ways to present technically complicated material in simple terms that will hold up in court
* Features content fully updated for Windows Server 2008 R2 and Windows 7
* Covers the emerging field of Windows Mobile forensics
Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.
Implementing 802.1X security solutions for wired and wireless networks
by
Geier, Jim
in
Computer networks
,
Computer networks -- Security measures
,
COMPUTERS / Computer Engineering
2008
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.