How to Investigate Like a Rockstar: Hacking the Planet
(eBook)
Description
Loading Description...
More Details
Language
English
Citations
APA Citation, 7th Edition (style guide)
Sparc Flow., & Sparc Flow|AUTHOR. (2017). How to Investigate Like a Rockstar: Hacking the Planet . sparc Flow.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Sparc Flow and Sparc Flow|AUTHOR. 2017. How to Investigate Like a Rockstar: Hacking the Planet. sparc Flow.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Sparc Flow and Sparc Flow|AUTHOR. How to Investigate Like a Rockstar: Hacking the Planet sparc Flow, 2017.
MLA Citation, 9th Edition (style guide)Sparc Flow, and Sparc Flow|AUTHOR. How to Investigate Like a Rockstar: Hacking the Planet sparc Flow, 2017.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouping Information
Grouped Work ID | bab17251-a67e-0895-26f3-5f3f857a146a-eng |
---|---|
Full title | how to investigate like a rockstar hacking the planet |
Author | flow sparc |
Grouping Category | book |
Last Update | 2024-05-15 02:00:44AM |
Last Indexed | 2024-06-29 04:19:48AM |
Hoopla Extract Information
stdClass Object ( [year] => 2017 [artist] => Sparc Flow [fiction] => [coverImageUrl] => https://cover.hoopladigital.com/dra_9781386926276_270.jpeg [titleId] => 14936585 [isbn] => 9781386926276 [abridged] => [language] => ENGLISH [profanity] => [title] => How to Investigate Like a Rockstar [demo] => [segments] => Array ( ) [pages] => 104 [children] => [artists] => Array ( [0] => stdClass Object ( [name] => Sparc Flow [artistFormal] => Flow, Sparc [relationship] => AUTHOR ) ) [genres] => Array ( [0] => Computers [1] => Internet [2] => Network Security [3] => Online Safety & Privacy [4] => Security ) [price] => 1.35 [id] => 14936585 [edited] => [kind] => EBOOK [active] => 1 [upc] => [synopsis] => The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers. Digital Forensics. We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while sharing insights into real crisis management. Rebuilding systems. Finally, we tackle the most important issues of any security incident response: how to kick the attackers out of the systems and regain trust in machines that have been breached. For those that read hacking books like the "Art of Exploitation" or "How to Hack Like a Pornstar", you finally get to experience what it feels like to be on the other side of the Firewall! [url] => https://www.hoopladigital.com/title/14936585 [pa] => [subtitle] => Hacking the Planet [publisher] => sparc Flow [purchaseModel] => INSTANT )