< back to articles

Viruses On Your Smartphone? Are You Protected?

More and more people have smartphones these days. Most or these phones are like mini computers and make your phone just as susceptible to viruses as your laptop.

Read more

 

 

 
Add a comment

Comments (1)

  1. Elisabetta, January 16, 2013
    There have been several autiirotathve books on computer forensics. (Including Tao of Network Security Monitoring by Bejtlich.) But this Real Digital Forensics book breaks new ground. Not in the theoretical modelling of an attack or countermeasures against it. Instead, there are several indepth case studies, that key off data given in the book's DVD. And the latter is a DVD, not a CD. The authors needed the multigigabyte capacity to store the provided data. Even then, these are compressed. This should give you some feeling of the book's emphasis. The authors address a serious lack in this field. How does someone [you] gain experience analysing a real attack? Without already being employed at a company experiencing such an event? In response, the authors made several scenarios that, they claim, reflect what actual attackers would likely have done. This is an experimental book. There is no overarching elegant theory. You are meant to roll up your sleeves and tackle each case. En route, the book shows how, as a defender, you can use several open source packages to dissect the attack, as well as impose countermeasures. Which is another nice feature. Those packages are free. It makes your forensics education very cheap, in terms of explicit capital outlay. Which is not to say that the book ignores commercial forensic tools. But the authors have a clear preference for open source, with which you might well concur. Reply

Add a comment

Top
(it will not be shared)