"Having worked with Erik on some of the most challenging computer forensic investigations during the early years of this industry's formation as well as having competed with him earnestly in the mar...
Completely rewritten 8th edition (2021) contains over 650 pages throughout 31 chapters! It is time to look at OSINT in a different way. For many years, and within the previous editions of this book, we have...
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious...
In the last engagement (The Hacker Playbook 2), you were tasked with breaking into the Cyber Kittens weapons facility. They are now back with their brand new space division called Cyber Space Kittens (CSK)....
The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also crea...
Take control of your privacy by removing your personal information from the internet with this second edition.
Author Michael Bazzell has been well known in government circles for his ability to locat...
Researching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countles...
This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization...
Enter your address and we will specify the offer for your area.