What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Maley, Bob; DeFranco, Joanna F.
Taylor & Francis Ltd
12/2022
180
Dura
Inglês
9781032146010
15 a 20 dias
Descrição não disponível.
1. Security Threats. 2. Cyber Security. 3. Strategy to Outpace the Adversary. 4. Preparing for an Incident. 5. Incident Response and Digital Forensics. 6. Development Security Operations. 7. Mobile Device Forensic Tools. 8. The Laws Most Likely to Affect IT and IT Security. 9. Cyber Security and Digital Forensic Careers. 10. Theory to Practice.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
incident;response;information;intrusion;detection;system;computer;advanced;persistent;threat;cyber security;network security;personal data security;cloud computing;mobile computing;security risks;digital forensics;OODA Loop;CIRT;Incident Response Team;CISO;Information Security;SQL Injection;Digital Forensics Professional;IR Process;Intrusion Detection Systems;Digital Evidence;Mobile Forensic;USB Drive;Secure Software Development Life Cycle;Zachman Framework;Computer Forensics;Wiretap Act;GIAC;Company's Ceo;SQLite Database;Packet Filtering;Cps;Mobile Phone Forensics;Black Kite
1. Security Threats. 2. Cyber Security. 3. Strategy to Outpace the Adversary. 4. Preparing for an Incident. 5. Incident Response and Digital Forensics. 6. Development Security Operations. 7. Mobile Device Forensic Tools. 8. The Laws Most Likely to Affect IT and IT Security. 9. Cyber Security and Digital Forensic Careers. 10. Theory to Practice.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
incident;response;information;intrusion;detection;system;computer;advanced;persistent;threat;cyber security;network security;personal data security;cloud computing;mobile computing;security risks;digital forensics;OODA Loop;CIRT;Incident Response Team;CISO;Information Security;SQL Injection;Digital Forensics Professional;IR Process;Intrusion Detection Systems;Digital Evidence;Mobile Forensic;USB Drive;Secure Software Development Life Cycle;Zachman Framework;Computer Forensics;Wiretap Act;GIAC;Company's Ceo;SQLite Database;Packet Filtering;Cps;Mobile Phone Forensics;Black Kite