• CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative guide addresses the tools and techniques required to... [Read More]

    • ASIN: 0071831568
    • ASIN: 0071831568
    • ISBN: 0071831568
    • Manufacturer: McGraw-Hill Education

  • Tableau Forensic SATA/IDE Bridge TK35U SiForce Bundle with Rugged Case

    The Tableau Forensic SATA/IDE Bridge is a portable write-blocker that enables forensic acquisition of SATA and IDE solid-state-drives.

    • ASIN: B07BSXGLNY
    • UPC: 682858560693
    • ASIN: B07BSXGLNY
    • Brand: SiForce
    • Size: TK35U +
    • Manufacturer: Silicon Forensics

  • A Practical Guide to Computer Forensics Investigations (Pearson IT Cybersecurity Curriculum (ITCC))

    All you need to know to succeed in digital forensics: technical and investigative skills, in one book   Complete, practical, and up-to-date Thoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networks Addresses online and lab investigations, documentation, admissibility, and more By Dr. Darren Hayes, founder of Pace University’s Code Detectives forensics lab–one of America’s “Top 10 Computer Forensics Professors” Perfect for anyone pursuing a digital forensics career or working with examiners   Criminals go where the money is. Today, tri... [Read More]

    • ASIN: 0789741156
    • UPC: 000789741156
    • ASIN: 0789741156
    • ISBN: 9780789741158
    • Brand: Pearson It Certification
    • Manufacturer: Pearson IT Certification

  • Incident Response & Computer Forensics, Third Edition

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The definitive guide to incident response--updated for the first time in a decade!Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including prepara... [Read More]

    • ASIN: 0071798684
    • ASIN: 0071798684
    • ISBN: 9780071798686
    • Brand: McGraw-Hill Osborne Media
    • Manufacturer: McGraw-Hill Education

  • Go Cyber!: Secrets to Make $100,000 in Cyber Security

    This book gives the shortcuts and secrets to achieve $100,000 a year in Cyber Security. The information will help you get there fast and cheap. Cheap meaning hundred dollar certifications instead of thousands of dollars of formal schooling debt. If you develop a passion for Cyber Security great! If you do not, the pay will be good enough to support a family, the skillsets are transferable and the job security is pretty good. As you go down this path to a profession in Cyber Security, the end result might actually be the same one stated by many people in the Cyber Security world — I love my j... [Read More]

    • ASIN: B075XDSLN5
    • ASIN: B075XDSLN5

  • Digital and Document Examination (Advanced Forensic Science Series)

    The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward. This volume, Digital and Document Examination, will serve as a graduate level text for those studying and teaching digital forensics and forensic document examination, as well as an excellent reference for forensic scientist’s libraries or use in their casework. Coverage includes digital devices, transportation, types of documents, forensic accounting and professional issues. Edited by a world-renowned leading forensic expert, the Advanced Forensic Sc... [Read More]

    • ASIN: B079FS3Q43
    • ASIN: B079FS3Q43
    • Manufacturer: Academic Press

  • CompTIA Security+ All-in-One Exam Guide, Fifth Edition (Exam SY0-501)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This fully updated study guide covers every topic on the current version of the CompTIA Security+ examTake the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and ma... [Read More]

    • ASIN: 1260019322
    • ASIN: 1260019322
    • ISBN: 1260019322
    • Manufacturer: McGraw-Hill Education

  • Penetration Testing T-Shirt - Gift for Pentesters Pentesting


    • ASIN: B07B372PJW
    • ASIN: B07B372PJW
    • Brand: Pentesting Hacker Hacking Pentester Shirt Co
    • Size: Male Small
    • Manufacturer: Pentesting Hacker Hacking Pentester Shirt Co

  • Rtfm: Red Team Field Manual

    The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations an... [Read More]

    • ASIN: 1494295504
    • ASIN: 1494295504
    • ISBN: 1494295504
    • Brand: CreateSpace Independent Publishing Platform
    • Manufacturer: CreateSpace Independent Publishing Platform

  • GOWOS Cat5e Shielded Ethernet Cable (5 Pack - 14 Feet) Blue - 24AWG Network Cable with Gold Plated RJ45 Molded/Booted Connector - 10 Gigabit/Sec High Speed LAN Internet/Patch Cable - ETL Listed

    Premium Cooper High Performance Category 5e Shielded Ethernet Cable For Secure Connections Our professional rj45 cat5e shielded cable is guaranteed to provide exceptional transmission performance and zero signal losses. With a reliable and universal connectivity intended for wired home or office networks. We also offer cat5e shielded bulk cable packs in 5,10, 50, or 100 packs offering all lengths that best fit your needs. This cat5e shielded pack makes it easier to find and customize your Cat5e shielded cable hub with a number of different lengths and colors to choose from. The snagless design... [Read More]

    • ASIN: B07TNPSTZ1
    • UPC: 655623565742
    • ASIN: B07TNPSTZ1
    • Brand: GOWOS
    • Size: 14 Feet, 5 Pack
    • Manufacturer: GOWOS Inc

  • The Hacker Playbook 3: Practical Guide To Penetration Testing

    Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ... [Read More]

    • ASIN: 1980901759
    • ASIN: 1980901759
    • ISBN: 1980901759
    • Manufacturer: Independently published

  • Blue Team Field Manual (BTFM) (RTFM)

    Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

    • ASIN: 154101636X
    • ASIN: 154101636X
    • ISBN: 154101636X
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Principles of Information Security

    Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. ... [Read More]

    • ASIN: 1337102067
    • ASIN: 1337102067
    • ISBN: 9781337102063
    • Manufacturer: Course Technology

  • CCNA Cyber Ops SECFND #210-250 Official Cert Guide (Certification Guide)

    CCNA Cyber Ops SECFND 210-250 Official Cert Guide from Cisco Press allows you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Cisco enterprise security experts Omar Santos, Joseph Muniz, and Stefano De Crescenzo share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to s... [Read More]

    • ASIN: 1587147025
    • ASIN: 1587147025
    • ISBN: 1587147025
    • Brand: Cisco Press
    • Manufacturer: Cisco Press

  • CCNA Cyber Ops (SECFND #210-250 and SECOPS #210-255) Official Cert Guide Library

    Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. Designed for all CCNA Cyber Ops candidates, it covers every objective concisely and logically, with extensive teaching... [Read More]

    • ASIN: 1587145006
    • ASIN: 1587145006
    • ISBN: 1587145006
    • Manufacturer: Cisco Press

  • Computer Incident Response and Forensics Team Management

    Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they

    • UPC: 23674777

  • CHFI Computer Hacking Forensic Investigator Certification All-In-One Exam Guide

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.An all-new exam guide for version 8 of the

    • UPC: 36684592

  • Mastering Windows Network Forensics and Investigation

    Provides information on how to investigate crimes involving Windows environments, covering such topics as registry structure, malware, logs, and cloud

    • UPC: 17334912

  • System Forensics, Investigation and Response with Virtual Lab Access: Print Bundle (Other)

    A&P

    • UPC: 995170879

  • Giac Certified Forensic Analyst Certification (Gcfa) Exam Preparation Course in a Book for Passing the Gcfa Exam - The How to Pass on Your First Try C

    Computer forensics (sometimes computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in

    • UPC: 26883032

  • Computer Forensics : Incident Response Essentials

    Two leading computer cops show how to use computer forensics--methodical processes and techniques for collecting, sorting, and analyzing computer misuse. Aimed at cyber avengers, this book fills the gap between all the Internet security books

    • UPC: 28075091
    • Rating: 5.0

  • Violent Python : A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    "Python is a hacker's language. With its decreased complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running

    • UPC: 21305486

  • Digital Forensics with Open Source Tools

    "Digital Forensics with Open Source Tools" is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide and explains the use of these

    • UPC: 14494429

  • Android Forensics : Investigation, Analysis and Mobile Security for Google Android

    "Android Forensics" covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. This book provides a thorough review of the Android platform including supported hardware

    • UPC: 15744233

  • Internet Forensics : Using Digital Evidence to Solve Computer Crime

    This practical guide to defending against Internet fraud gives readers the skills to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, it

    • UPC: 52846267
    • Rating: 2.0

  • How to start a career in Computer Forensics

    Getting started in digital forensics

    Intro to Computer Forensics: Module 5: Forensic recovery