Thursday, May 2, 2013

EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide 3rd edition, Steve Bunting



It's a great book that goes quite beyond EnCase software. It covers many additional concepts that help on a forensic work.
The tests at the end of each chapter help to resume the main topics.

I was looking for a book that covered all the additional knoledge that is missing on EnCase manuals and help. I found them here.

I eagerly waited for the arrival of this book so that I could start learning the new features of Encase 7, however when it arrived, I could only read about it, no hands on because it does not contain the application. I can down load evidence files, but without the application, it is useless!

This book help me prepare for the EnCase exam. Mr. Bunting really explain how to master EnCase 7 and provided tips and techniques that you can use in a real-life scenario. Again, Thank you to the author. This book is a must-have for aspiring EnCEs.

Very thorough study guide. The supplemental material is available online . Is very well written and has helped immensely. Great for review after taking encase I and II

I am very impressed with the new edition of the EnCase Certified Examiner study guide, but am a little disappointed that this edition is not available electronically and if I want it electronically, I have to purchase it again. This means when I travel I have to carry the book with me instead of having a pdf version on my laptop. The other online content does not seem too bad, other than it took a few hours to download because the site only allowed 5 simultaneous sessions. Overall, this is not a bad purchase, I just wish that it came in an electronic format so I could use it from my laptop.

There are only a few tens of thousands of people vitally concerned with EnCase - and most of us got quite a shock when Guidance Software, its publisher, released EnCase Forensic v7, a radical departure from previous versions.

That this book was released almost a year past its original announced publication date is evidence of this.

And evidence gathering and analysis is what EnCase is all about. It is the leading digital evidence acquisition and analysis tool. (It's actually a suite of tools that are transparently welded together.)

This is the third edition of this study guide. Guidance Software was once notorious for poor documentation. While that reputation has slowly been shed as Guidance has moved toward creating better documentation, the manual remained sparse with little explanation of the many tools available.

Steve Bunting filled that void with his first edition. While intended to help people prepare for the EnCase Certification exam, Bunting provides a self-teaching course in both using EnCase and a substantial explanation of the technology EnCase is used to explore. This quality makes it a much more useful tool than the EnCase manual itself for those willing to devote the time to thorough reading.

This time out, Bunting had his hands full with EnCase v7. The EnCase users forums have been filled with complaints, many of them justified, while many were clearly from people too busy to read the (adjective deleted) manual.

The book itself is what I have come to expect from Bunting. It is modular, broken down into small sections arranged in a logical, sequential manner. It is thorough, including short - and very necessary - sections on configuring computers for the vastly greater demands of v7. It is good, welcome and very useful information.

A couple of chapters are given to concise, but reasonable thorough, explanations of File System basics and proper acquisition procedures. The next or so pages are given to using EnCase. Every page is packed with specific detail. No padding here.

This is a teaching text, a study guide. No doubts about it. There are review questions at the end of each chapter. Even if you're not planning on taking the certification exam, the reviews are very helpful as a way to measure your comprehension. There is no cD with this edition. Instead the supplementary materials are available online.

Overall, Steve Bunting retains his reputation in my eyes as the author of the best EnCase study guide in print, even if it is the only one. If you use EnCase forensic and own or plan to upgrade to v7, you need this book.

Product Details :
Paperback: 744 pages
Publisher: Sybex; 3 edition (September 11, 2012)
Language: English
ISBN-10: 0470901063
ISBN-13: 978-0470901069
Product Dimensions: 7.3 x 1.5 x 9.2 inches

More Details about EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide 3rd edition

or

Download EnCase Computer Forensics -- The Official EnCE: EnCase Certified Examiner Study Guide 3rd edition PDF Ebook

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, Bruce Schneier



Bruce Schneier's APPLIED CRYPTOGRAPHY is an excellent book for anyone interested in cryptology from an amateur level to actually being involved in the development of new encryption mechanisms. Schneier's book begins with a simple discussion of what is cryptography, and then he proceeds through the history of various encryption algorithms and their functioning. The last portion of the book contains C code for several public-domain encryption algorithms.

A caveat: this is not a textbook of cryptography in the sense that it teaches everything necessary to understand the mathematical basis of the science. Schneier does not discuss number theory because he expects those who use the relevant chapters of the book will already have training in higher maths. Nonetheless, the book does contain a wealth of information even for the layman.

One helpful part of Schneier's book is his opinion of which encryption algorithms are already broken by the National Security Agency, thus letting the reader know which encryption programs to avoid. There will always be people who encrypt to 40-bit DES even though it is flimsy and nearly instantly breakable, but the readers of APPLIED CRYPTOGRAPHY can greatly improve the confidentiality of their messages and data with this book. Discussion of public-key web-of-trust is essential reading for anyone confused by how public-key signatures work.

APPLIED CRYPTOGRAPHY was published in 1995 and some parts are already out of date. It is ironic that he hardly mentions PGP, when PGP went on to become the most renowned military-strength encryption program available to the public, although it is being superseded by GnuPG. Another anachronism is Schneier's assurance that quantum computing is decades away. In the years since publication of APPLIED CRYPTOGRAPHY we have seen some strides in quantum computer, even the creation of a quantum computer that can factor the number 15. While this publicly known quantum computer is not at all anything to get excited about, it is certain that more powerful quantum computers are in development and classified by NSA. Because a quantum computer can break virtually any traditional cipher, hiding the message (steganography) is becoming more important than ever. In the era of Schneier's book steganography was unnecessary because ciphertext could withstand brute-force attacks, but with advances in computing power steganography is becoming vital to secure communications. It would be nice to see the book updated with this topic, because cryptography and steganography can no longer be regarded as two distinct fields.

All in all, in spite of its age, APPLIED CRYPTOGRAPHY is recommended to anyone interested in cryptography. It ranks among the essential books on the field, although an updated version is certainly hoped for.

Habitues of sci.crypt will be familiar with Bruce Schneier's
*Applied Cryptography*; if any of them have but one text on crypto
for reference, it will almost certainly be *Applied Cryptography*.
It is the de facto standard reference on modern cryptography as
well as serving as an excellent introduction to the subject.


The art is very old - Julius Caesar was the first recorded user of
cryptography for military purposes - and reached a watershed when
computers were put to work in order to break German and Japanese
ciphers. Indeed, that was the first *real* application of electronic
computers. A natural development was the use of computers for the
development of cryptographic systems.


That is where Bruce Schneier's remarkable book begins. It is notable
for two reasons: the breadth and depth of coverage, and the high
standard of technical communication.


As a reference its scope is encyclopaedic, providing descriptions
and assessments of just about every non-military crypto system
developed since computers were first applied to the purpose. There
are also military-cum-government algorithms amongst the collection,
some from the old Soviet Union and others from South Africa. It is
not just an A-Z procession of algorithms; the author progresses
in a logical manner through the many technical aspects of cryptography.


It is common to find that masters of mysterious technical arts are
poor communicators. Bruce Schneier demonstrates exceptional skill
as a technical communicator. Here is a book about an esoteric
subject - one built on a foundation of theoretical mathematics - that
ordinary folk can read. Sure, one needs to be motivated by an interest
in the subject, and the technical level sometimes requires a more than
ordinary background in number theory and the like - but a degree in
theoretical mathematics is not necessary to derive pleasure and profit
from reading *Applied Cryptography*.


A thirty-page chapter provides a brief, but lucid account of the
necessary mathematical background, spanning information theory,
complexity theory, number theory, factoring, prime number generation,
and modular arithmetic. Even if one needs no other information than
a useful description of modular arithmetic the book is worth looking
at; I can't think of any better source outside full-blown mathematical
texts, and the author does it without being obscure.


The book is divided into parts, beginning with protocols (the
introductory chapter is an excellent overview of crypto as it
is presently applied) from the basic kind through to the esoteric
that find application in digital cash transactions. Public key
encryption, the second - and most significant - watershed in cryptography, is introduced with an explanation of how it is used
in hybrid systems.


Part II deals with cryptographic techniques and discusses the
important issues of key length, key management, and algorithm
types. The strength of a crypto system relies very heavily on the
length of the key, the way in which it is generated, and key
management. A chapter is devoted to the practical aspects of using
algorithms (which one, public-key as against symmetric crypto,
hardware versus software) for various purposes (such as
communications and data storage).


Part III is about particular algorithms, providing for each one
a background of its development, a description, its security, and
how it is likely to stand up to attack. The algorithms are divided
into classes: block (some twenty-one are described);
pseudo-random-sequence generators and stream ciphers (PKZIP is a
stream cipher); real random-sequence generators; one-way hash
functions; public-key; public-key digital signature; identification
schemes; key-exchange algorithms; and other special algorithms.
Many specific algorithms are described with information about
covering patents.


Part IV is entitled, The Real World; in the words of the author,
"It's one thing to design protocols and algorithms, but another
thing to field them in operational systems. In theory, theory
and practice are the same; in practice they are different".
A chapter discusses a number of implementations, including IBM
Secret-Key Management Protocol, Mitrenet (an early public-key
system), ISDN Packet Data Security Overlay, STU-III, Kerberos,
KryptoKnight, Sesame, PEM, PGP, MSP, smart cards, universal
electronic payment system, and Clipper.


Another chapter discusses politics and puts the problems of US
export restrictions into context and deals with patents. It also
has information about bodies with an interest in public access to
cryptography and standards, and legal issues.


An afterword by Matt Blaze should be required reading by everyone
who thinks a good cryptosystem is all that one needs for security;
the human factor can undo the strongest system.


A final part contains C source code for DES, LOKI91, IDEA, GOST,
Blowfish, 3-Way, RC5, A5, and SEAL. North American readers can
obtain a 3-disk set containing code for some forty-one algorithms,
four complete systems, source code for some other utilities,
text files, errata, and notes on new protocols and algorithms.


Who, apart from crypto professionals and aficionados, is likely
to find *Applied Cryptography* of interest? Anyone with an
intelligent interest in the art, and who wants something more
substantial than a quasi adventure account of modern crypto;
anyone with a responsibility for protecting data and/or
communications; network administrators; builders of firewalls;
students and teachers of computer science; programmers; and
anyone with a serious interest in theoretical mathematics - I'm
sure the list could be expanded considerably.

Apart from a book to be read, it is the most complete and up-to-date
resource and reference presently available. The list of references
(1653 of them) is a resource in its own right. An essential
acquisition for libraries.

The book, of necessity, contains highly technical material, but it
can be read. The publishers, Wiley's, are to be congratulated.

Applied Cryptography is quite simply the quintessential guidebook for information about cryptography. It also is one of the finest computer security books ever written. Bruce Schneier is a cryptologist who has a passion for cryptography, and it shows in his masterpiece. Instant classic is an often used oxymoron, yet that term is most appropriate to describe Applied Cryptography. If you have any interest with security and encryption, Applied Cryptography is clearly the definitive publication to reference and the most comprehensive text available about security and encryption. It might sound as if via my high praise for this book that I am getting some type of endorsement, that is not the case. It is just that Applied Cryptography is quite simply the most comprehensive, up-to-date work about cryptography.

The vast array of topics covered by the book is truly astounding in is depth and breadth. There is hardly a single cryptological concept, either minor or major, that the book does not cover. It is not possible to detail everything Applied Cryptography covers. But a few of the topics are: Foundations of cryptography, Protocols, Protocol Building Blocks, Key Lengths, key exchange, key management, Algorithms, the mathematical of cryptography, DES, RSA, One-Way Hash Functions, Symmetric vs. Public-Key cryptography, Public-Key Digital Signature Algorithms, Substitution Ciphers and Transposition Ciphers, Digital Signatures, Random and Pseudo-Random Sequence Generation, PGP, Authentication, Advanced security Protocols, Cryptographic Techniques, Identification Schemes, the politics of cryptography and much (much!) more.

Applied Cryptography also includes the source code for DES, IDEA, BLOWFISH, RC5 and other algorithms. It even covers encryption algorithms from the former Soviet Union, including GOST.

The magnificence of Applied Cryptography is that Schneier is able to take very complex, abstract ideas and express them in an extremely comprehensible manner. Applied Cryptography therefore lacks the dryness that plagues a lot of textbooks. Schneier is able to take both theoretical and academic ideas, and mold them into practical real-world intelligible book. All in all, Applied Cryptography makes for some very enjoyable and occasionally humorous reading.

One thing I really liked about Applied Cryptography is its index. Rather than using the traditional cumbersome citations such as RIV92b or GOL88 that often take a while to locate, Schneier simply uses numbers. In light that he references over 1600 sources, it makes looking up the sources an incredible time saver. What is extremely impressive about Applied Cryptography is that Schneier quotes from every imaginable source. From general security periodicals, scholarly academic journals, conference proceedings, government publications and official standards, Schneier has been there.

Schneier writes at length about whether a crypto customer should choose an algorithm for that is publicly published algorithm (i.e., DES, RSA, Blowfish) or to use a proprietary algorithm that belongs to a specific manufacturer. With a proprietary algorithm, Schneier writes that it is impossible to determine how truly secure the algorithm is, given that the owners do not generally make their code available for open inspection. There is even the possibility that the manufacturer (or government, if under federal contract) has put in a back door into the algorithm. Schneier states that: "Putting your trust in a single manufacturer, consultant, or government is asking for trouble. The NSA has some of the world's best cryptographers working for it, but it is hard to know if they're telling you all you know."

This idea then segues into the (in)famous Clipper chip and concept of key escrow. As a world class cryptographer, Schneier has major issues with the concept of Clipper, calling it "Orwellian" Schneier feels that encryption is too important to be left to the government and Clipper advances the power of the government over the right of the people.

In conclusion, Applied Cryptography is a must have book for anyone involved with encryption and security.

Product Details :
Paperback: 758 pages
Publisher: Wiley; 2nd edition (October 18, 1996)
Language: English
ISBN-10: 0471117099
ISBN-13: 978-0471117094
Product Dimensions: 7.5 x 1.6 x 9.2 inches

More Details about Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

or

Download Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition PDF Ebook

Network Warrior 2nd edition, Gary A. Donahue



Whether you're showing up on the job fresh from a Cisco certification with no job experience or you've been in the field for awhile this book has something to offer that you're not going to find elsewhere. In a nutshell, it is the networking book to help you get your job done. The book focuses on teaching what you need to know on the job and not just information to to pass a certification exam. It helps turn on light bulbs that you may not get when reading cisco Press books. It explains thing with simple examples and uses fun analogies. I have to say this
is the first networking book that I have read that I just didn't want to put down. (think spy thriller or mystery novel) If you are in the networking field, buy this book and read it cover to cover like I did. (or virtual cover to cover via Kindle in my case) Absolutely wonderful book!

One of the best book for sure, a very true focus between CCNA and CCNP. It will be the excellent book after you finished CCNA.

However,there are something to be desired on some topics. For example, the QOS chapter is clearly confused reader on queuing topic, CBWFQ and LLQ. No information about maximum priority rate and after guarantee certain amount, how difference between those 2 queuing on the left sources.

To be honest, this is the shortcoming of this book, it covered almost all the topics in network area, however, some of them are not deep enough or I can say the topic itself is too complicated to explain.

Again, this is definitely one of the best book in this market.

This is book is a must to get your basics in order once again. over a period of time you tend to forget the technologies that you used in pasd and are now not actively involved in them. This books helps you remember it. Going through the book is like getting those light bulbs in your mind go On. The most common reaction for me when reading this book was " aahh...I read it...Now I remember it." Happy Recollecting.

Network Warrior is one of those books that every IT pro should have. I actually ordered an additional copy of this book to keep at home as when I first received it I was taking it to and from the office.

I recommend it to anyone who is not only getting started in networking, but also for anyone who is an IT "jack of all trades," as it's impossible to remember all the little command nuances or the real world best practices of a technology if you don't use it every day.

When I need to do something networking-related that I haven't done in a while, I usually look in this book first. For example, I know tomorrow I'm going to be setting up an old Catalyst 3550 as a multilayer switch for a project. I haven't set up an SVI in at least a year. I know I need to put a "no switchport" command in somewhere. I know I could search online for it, but then there's always Network Warrior!

I used the first edition all of the time at work. Very helpful guide. This edition 2, same information as the first with a lot of new content. The VoIP stuff is good, nice intro to CME, you're not going to be able to troubleshoot Call Manager or anything, but it nice for the voice gateways. The ASA stuff is good, though I wish they would have set it up like the rest of the book where their showing CatOS, IOS and NEXUS. I still deal with customers who have PIX and some have ASAs. Most things are very similar but not everything. The MPLS entry is a waste of only 6 pages. The wireless is a bit of a waste too. It good if you are dealing with autonomous AP's or single Cisco AP's at the house. Otherwise you should know this from the CCNA. The High availability stuff (HSRP) is good.

I have relied on the first edition and I trust the second will be there too. As many topics were expanded upon and troubleshooting methods were added. This is definatly my field manual of choice.

If you walk into any networking geeks secret lair and scan your eyes along the endless horizon of nerdomenclature, you'll undoubtedly find Gary Donahue's original Networking Warrior somewhere pressed up against a vast collection of Cisco Press, Sybex, O'Reilly and occasional Max Brooks literature. From the beginning Gary Donahue's masterpiece has been widely accepted as thee' post CCNA book for every Cisco guy since 2007. As the unofficial go to manual for everything untaught on the CCNA a Cisco network engineer needs to know, Gary has taken his place among the elite masters Cisco authors such as Jeff Doyle, Wendell Odom, Jeremy Cioara and David Hucaby just to name a few.

Networking Warrior Second Edition has updated it's core example technologies to reflect the ever evolving industry we as network engineers work with on a daily bassis. Giving us operational examples on Cisco new cutting edge equipment including the Cisco ASA Firewalls 8.0+ IOS, 3750 & 6500 switches and even the super-cool new Nexis product line emerging from the dark shadows intending to over the world one packet at a time. Gary takes his time at the end of each applicable chapter to explain the differences of implementing each technology though the IOS, CatIOS and new Nexus NX-OS giving clear examples that are easy to follow doubling this book as an excellent field manual alongside the extremely popular Portable Command Guides published by Cisco Press.

What make book unique from most publishing's is Gary's sparkling humor scatted throughout his writings. One moment he will be explaining the technical aspect of the subject, the next he'll be making a metaphor funny enough to make your Spouse look over your shoulder and ask "whats so funny?", and after the fourth or fifth time may or may not be a good thing. Even though this book flows very well, it is not without it's fresh off the print edition errors. There are areas in the text where examples have not been updated to reflect the new books updated example equipment, other areas have diagram abnormalities, but we're not here to judge Gary's wife's editorial skills. I'm sure it's hared enough just to put up with him (joking of course).

Garry mentions and gives a great amount credit to his wife as being his front line editor though the many months involved in writing this book.

Networking Warrior spans an impressive 41 chapters covering a slue of topics. Just holding this book in your hands and thumbing though the chapter indexes gives you an idea of just how much Gary covers. I'd like to say this book is an excellent cover to cover read, and in some major blocks it is, but there are some section that no matter how supper-geek status you give yourself you'll just find yourself over inundated with information or lack of understanding, especially if you're fresh off the CCNA boat. The clear cut and skinny on this book is: If you're a CCNA looking for the next step, or a networking nut wanting to freshen up your knowledge of Cisco solutions you're in for a treat. Because Gary Donahue has everything but gift wrapped you the next book to fill that empty slot on your bookshelf. If is, if it ever gets off your desk.

Upshot: And you may find yourself...in a machine room or data center. You will need this book. Pros: If you just passed your CCNA exam, or have started working with enterprise level Cisco kit, there's a lot here for you. Cons: If you DON'T work with Cisco kit, why are you here?

For anyone not acquainted with data-centers & network operations, this book shows you how the other hardware half lives. When the author says `you should have passed the CCNA' he's very serious. There are NO EXPLANATIONS of basic Cisco terms. If you are not versed in TCP/IP and SOME Cisco kit, you will be spending a LOT of time in Google. And probably asking yourself why you bought this book.

Those cautions aside, there are gems of `best practices' for non Cisco or smaller network techs here: Amid the Cisco jargon you will find practical advice even for your small business or SOHO LAN, like in Ch. 27 `Basic Firewall Theory', or Chapter 29 on different flavors of 802.11x WiFi and how to secure it. The author even introduces IPv6, with one of the most straightforward explanations I've read yet.

But what really makes this book worth it are the backstories & practical advice from a veteran to new engineers on how to handle failure scenarios as well as the politics involved in maintaining large networks.

In fact, everything from Chapter 39 (`Failure'), Chapter 40 (`GAD's Maxims') to Chapter 41 (`Avoiding Frustration') would be welcome in any IT, infosec or dev reference.

In short, I would somewhat recommend this book for non-CCNA folks interested in Network Engineering or Infrastructure. But I would highly recommend Network Warrior for the audience for which it was intended.

Disclosure: I received the eBook download from O'Reilly for review purposes. I'm not a CCNA but have been around.

Product Details :
Paperback: 788 pages
Publisher: O'Reilly Media; Second Edition edition (June 2, 2011)
Language: English
ISBN-10: 1449387861
ISBN-13: 978-1449387860
Product Dimensions: 7 x 1.5 x 9.2 inches

More Details about Network Warrior 2nd edition

or

Download Network Warrior 2nd edition PDF Ebook