search for books and compare prices
How to Investigate Like a Rockstar: Live a real crisis to master the secrets of forensic analysis (Hacking the Planet)
By
Sparc FLOW
Price
Store
Arrives
Preparing
Shipping
Jump quickly to results on these stores:
The price is the lowest for any condition, which may be new or used; other conditions may also be available.
Bibliographic Detail
Publisher
Independently published
Publication date
August 17, 2017
Pages
107
Binding
Paperback
ISBN-13
9781549527623
ISBN-10
1549527622
Dimensions
0.27 by 6 by 9 in.
Original list price
$16.99
Amazon.com says people who bought this book also bought:
Gray Hat C#: Creating and Automating Security Tools | Building Virtual Machine Labs: A Hands-On Guide | Ultimate Hacking Challenge: Train on dedicated machines to master the art of hacking (Hacking The Planet) | How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Planet) | How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK (Hacking the planet) | Advanced Penetration Testing: Hacking the World's Most Secure Networks | Hash Crack: Password Cracking Manual (v2.0) | Blue Team Field Manual (BTFM) (RTFM) | Kali Linux Revealed: Mastering the Penetration Testing Distribution
Gray Hat C#: Creating and Automating Security Tools | Building Virtual Machine Labs: A Hands-On Guide | Ultimate Hacking Challenge: Train on dedicated machines to master the art of hacking (Hacking The Planet) | How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Planet) | How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK (Hacking the planet) | Advanced Penetration Testing: Hacking the World's Most Secure Networks | Hash Crack: Password Cracking Manual (v2.0) | Blue Team Field Manual (BTFM) (RTFM) | Kali Linux Revealed: Mastering the Penetration Testing Distribution
Summaries and Reviews
Amazon.com description: Product Description:
"There are two kinds of companies: those that have been breached and those that do not know it yet."
The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!Pricing is shown for items sent to or within the U.S., excluding shipping and tax. Please consult the store to determine exact fees. No warranties are made express or implied about the accuracy, timeliness, merit, or value of the information provided. Information subject to change without notice. isbn.nu is not a bookseller, just an information source.