Blog Posts Tagged with "Book Review"

3e35900ae6facc6c146a85c435c71d82

Burdens of Proof: Cryptographic Culture & Evidence Law in the Age of Electronic Documents

February 19, 2013 Added by:Ben Rothke

When the IBM PC first came out 31 years ago, it supported a maximum of 256KB RAM. You can buy an equivalent computer today with substantially more CPU power at a fraction of the price. But in those 31 years, the information security functionality in which the PC operates has not progressed accordingly.

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Information Security Management Handbook

January 28, 2013 Added by:Ben Rothke

While the book is organized under the CISSP CBK domains, it should not readily be used as a primary reference for those studying for the CISSP exam, given its unmanageable length as a primary reference...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Malware Forensics Field Guide for Windows Systems: Digital Forensics

January 22, 2013 Added by:Ben Rothke

The book is not meant as an introductory text, rather as a reference for experienced professionals. For such a reader, they will likely find the Malware Forensics Field Guide for Windows Systems to be an invaluable reference...

Comments  (0)

48f758be63686a73484a7380e94f73d0

The Phoenix Project: A Review

January 16, 2013 Added by:Ed Bellis

Gene Kim was kind enough to provide me with an advanced review copy of The Phoenix Project who is a co-author of the book. Fair warning: the first half of this book brought back nails-on-a-chalkboard type memories of dealing with large-scale audits and everything that comes with it...

Comments  (3)

3e35900ae6facc6c146a85c435c71d82

Ethics of Big Data: Balancing Risk and Innovation

December 18, 2012 Added by:Ben Rothke

While few organizations have specific policies around big data, even less how though about the ways in which people in their organization use that data and the ethical issues involved. The benefits of big data analytics are significant, but the potential for abuse is also considerable...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Two New SQL Security Books from Syngress

November 29, 2012 Added by:Ben Rothke

Since SQL is so ubiquitous on corporate networks, with sites often running hundreds of SQL servers; SQL is prone to attacks. SQL injection is a technique often used to attack databases through a website and is often done by including portions of SQL statements in a web form entry field...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Everyday Cryptography: Fundamental Principles and Applications

November 20, 2012 Added by:Ben Rothke

Key management is one of the most important aspects of cryptography and often the most difficult. Part of the difficulty around key management is at the user level, with key updates, passphrase management and more. Ultimately, effective key management is essential to the underlying security of the cryptosystem...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Reverse Deception: Organized Cyber Threat Counter-Exploitation

November 14, 2012 Added by:Ben Rothke

Every organization of size and scope is a target, and many of the world’s largest firms and governments have been victims. In Reverse Deception: Organized Cyber Threat Counter-Exploitation, Dr. Max Kilger and his co-authors provide an effective counterintelligence approach in which to deal with APT...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Digital Forensics for Handheld Devices

November 05, 2012 Added by:Ben Rothke

An iPhone 5 with 64 GB of storage and the Apple A6 system-on-a-chip processor has more raw computing power entire data centers had some years ago. With billions of handheld devices in use , it is imperative that forensics investigators know how to ensure that the data in them can be preserved...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Advanced Penetration Testing for Highly Secured Environments: The Ultimate Security Guide

October 31, 2012 Added by:Dan Dieterle

What information is being broadcast by your computers, company, or employees, that don’t show up in a software scan? Many companies think that if they just run a vulnerability scan and it passes that they are good, but is this an accurate test of your network security?

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

CISSP for Dummies

October 24, 2012 Added by:Ben Rothke

The CISSP is the most popular and arguably most valuable information security certification. While SANS GIAC certifications are technically more intensive, the CISSP is the 900-pound gorilla of information security certifications. For those looking review guide, CISSP for Dummies is a worthwhile reference...

Comments  (2)

3e35900ae6facc6c146a85c435c71d82

Securing Smart Grid, SCADA, and Other Industrial Control Systems

October 11, 2012 Added by:Ben Rothke

The Stuxnet computer worm of mid-2010 was a huge wake-up call for the energy industry. It also catapulted SCADA from an obscure term to the forefront of industrial security. But nearly two years later, it is unclear if the energy sector is adequately prepared for sophisticated information security threats...

Comments  (2)

3e35900ae6facc6c146a85c435c71d82

Navigating Social Media Legal Risks: Safeguarding Your Business

October 03, 2012 Added by:Ben Rothke

Social media makes it easy for organizations to find and retain customers and increase sales, amongst many other benefits. At the same time, it can expose an organization to significant and highly-expensive legal risks and issues, and find themselves at the receiving end of a subpoena...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Hacking Exposed 7: Network Security Secrets and Solutions

September 23, 2012 Added by:Ben Rothke

With the release of Hacking Exposed 7: Network Security Secrets & Solutions, authors Stuart McClure, Joel Scambray and George Kurtz (along with over 10 contributing authors) provide an up to date version to the original classic. The book includes the essentials of hacking...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Practical Packet Analysis

September 18, 2012 Added by:Jayson Wylie

This book details topics and features to help analyze traffic issues and identify potential problematic points to improve performance and verify the valid flow of common network communications that can help differentiate the good traffic from the bad...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Digital Vertigo: Today's Online Social Revolution is Disorienting Us

September 16, 2012 Added by:Ben Rothke

In the new world of social media and Web 3.0, which is claiming to revolutionize communication and interactions, history is repeating itself. Web 3.0 is turning into an Orwellian infrastructure where the ruling party wields total power over the inhabitants...

Comments  (3)

Page « < 1 - 2 - 3 - 4 > »
Most Liked