Catalog Search Results
Showing Results using Keyword index
Author
Publisher
Packt Publishing, Limited
Pub. Date
2022
Language
English
Description
Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365 Key Features Design, implement, and administer Microsoft Information Protection Implement data loss prevention to minimize the risk of data exfiltration Use Information Governance capabilities to ensure that data is stored in your environment for as long as necessary Book Description Cloud technologies have massively increased the...
Author
Publisher
Packt Publishing, Limited
Pub. Date
2022
Language
English
Description
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques Key Features Explore memory forensics, one of the vital branches of digital investigation Learn the art of user activities reconstruction and malware detection using volatile memory Get acquainted with a range of open-source tools and techniques for memory forensics Book Description Memory Forensics is a powerful analysis technique that can be...
Author
Publisher
Packt Publishing, Limited
Pub. Date
2022
Language
English
Description
Gain practical knowledge of shellcode and leverage it to develop shellcode for Windows and Linux operating systems, while understanding the countermeasures in place and how these can be bypassed Key Features Get up and running with shellcode fundamentals Develop Shellcode for Windows and Linux Understand the building blocks of shellcode Book Description Shellcoding is a technique that is executed by many red teams and used in penetration testing and...
Author
Publisher
Packt Publishing, Limited
Pub. Date
2022
Language
English
Description
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and tools Key Features Understand modern human-operated cyber attacks, focusing on threat actor tactics, techniques, and procedures Collect and analyze ransomware-related cyber threat intelligence from various sources Use forensic methods and tools to...
Similar Searches
These searches are similar to the search you tried. Would you like to try one of these instead?
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request