Contents: Chapter 1 Incident response The incident response process The incident response framework The incident response plan The incident response playbook Summary Chapter 2 Forensic fundamentals Legal aspects Digital forensic fundamentals Summary Chapter 3 Network evidence collection Preparation Network device evidence Packet capture Evidence collection Summary Chapt…
--
Table of contents: 1. Defining a discipline 2. A risk management framework 3. Introduction to software security touchpoints 4. Code review with a tool 5. Architectural risk analysis 6. Software penetration testing 7. Risk-based security testing 8. Abuse cases 9. Software security meets security operations 10. An enterprise software security program 11. Knowledge for software security…
Table of content: 1. Introduction and literature survey 1.1 Intrduction 1.2 Computer imaging system 1.3 Attacks, services, and mechanisms 1.4 Security services 1.5 Attacks 1.6 Security attacks 1.7 The aim of thesis 1.8 Related literature & historical review 1.9 Scope of thesis 2. Theoretical principles and measures 2.1 Introduction 2.2 Image file formats 2.3 Key security 2.4 Sy…
Table of contents 1. A Crawler Guard for Quickly Blocking Unauthorized Web Robot 2. Privacy Preserving for Location-Based Services Using Location Transformation 3. Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux 4. Multiple-Bank E-Cash without Random Oracles 5. A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy 6. Preserving User Priv…
Contents: A is for advanced persistent threats B is for botnet C is for cloud D is for dwell-time E is for exploit F is for firewall G is for governance H is for hacker I is for indicators of compromise (IOC) J is for java K is for kill chain L is for logic bomb M is for malware N is for network segmentation O is for OWASP P is for patch management Q is for quarantine R is f…
Contents: Experimenting linear cryptanalysis Linear cryptanalysis using multiple linear approximations Linera attacks on stream ciphers Using tools from error correcting theory in linear cryptanalysis Correlation analysis in GF (2) Subject index Author index
Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
Contents: Chapter 1 Getting started with fireSIGHT Chapter 2 Object management Chapter 3 IPS policy management Chapter 4 Access control policy Chapter 5 FireSIGHT technologies Chapter 6 Intrusion event analysis Chapter 7 Network-based malware detection Chapter 8 System settings Chapter 9 Account management Chapter 10 Dwvice management Chapter 11 Correlation policy Chapte…