27,62 €
30,69 €
-10% with code: EXTRA
How to Investigate Like a Rockstar
How to Investigate Like a Rockstar
27,62
30,69 €
  • We will send in 10–14 business days.
"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfec…
30.69
  • Publisher:
  • Year: 2017
  • Pages: 118
  • ISBN-10: 1549527622
  • ISBN-13: 9781549527623
  • Format: 15.2 x 22.9 x 0.7 cm, minkšti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

How to Investigate Like a Rockstar (e-book) (used book) | bookbook.eu

Reviews

(4.42 Goodreads rating)

Description

"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!

EXTRA 10 % discount with code: EXTRA

27,62
30,69 €
We will send in 10–14 business days.

The promotion ends in 24d.03:38:25

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,31 Book Euros!?
  • Author: Sparc Flow
  • Publisher:
  • Year: 2017
  • Pages: 118
  • ISBN-10: 1549527622
  • ISBN-13: 9781549527623
  • Format: 15.2 x 22.9 x 0.7 cm, minkšti viršeliai
  • Language: English English

"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)