headerdesktop macbooktimer14ian26

MAI SUNT 00:00:00:00

MAI SUNT

X

headermobile macbooktimer14ian26

MAI SUNT 00:00:00:00

MAI SUNT

X

Promotii popup img

💻CÂȘTIGĂ un Laptop MacBook Air!

🍀Fii chiar tu cititorul norocos»

How to Investigate Like a Rockstar: Live a real crisis to master the secrets of forensic analysis

De (autor): Sparc Flow

How to Investigate Like a Rockstar: Live a real crisis to master the secrets of forensic analysis - Sparc Flow

How to Investigate Like a Rockstar: Live a real crisis to master the secrets of forensic analysis

De (autor): Sparc Flow


"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!
Citește mai mult

-10%

PRP: 131.67 Lei

!

Acesta este Prețul Recomandat de Producător. Prețul de vânzare al produsului este afișat mai jos.

118.50Lei

118.50Lei

131.67 Lei

Primești 118 puncte

Important icon msg

Primești puncte de fidelitate după fiecare comandă! 100 puncte de fidelitate reprezintă 1 leu. Folosește-le la viitoarele achiziții!

Indisponibil

Descrierea produsului


"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall!
Citește mai mult

S-ar putea să-ți placă și

De același autor

Părerea ta e inspirație pentru comunitatea Libris!

Istoricul tău de navigare

Acum se comandă

Noi suntem despre cărți, și la fel este și

Newsletter-ul nostru.

Abonează-te la veștile literare și primești un cupon de -10% pentru viitoarea ta comandă!

*Reducerea aplicată prin cupon nu se cumulează, ci se aplică reducerea cea mai mare.

Mă abonez image one
Mă abonez image one
Accessibility Logo