- Books/Videos on Sale (or Free) Today
- New/Updated Safari Books and Courses
- New/Updated Pluralsight Courses
These deals are good for today only, so be sure to take advantage of the pricing before the offers expire.
Free Packt eBook by Richard Boddington (valid through 11/02 at 19:00 EST). This book covers Digital Forensics.
Get started with the art and science of digital forensics with this practical, hands-on guide!
Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing investigation plan and preparing toolkit for investigation.
In this book you will explore new and promising forensic processes and tools based on ‘disruptive technology’ that offer experienced and budding practitioners the means to regain control of their caseloads. During the course of the book, you will get to know about the technical side of digital forensics and various tools that are needed to perform digital forensics. This book will begin with giving a quick insight into the nature of digital evidence, where it is located and how it can be recovered and forensically examined to assist investigators. This book will take you through a series of chapters that look at the nature and circumstances of digital forensic examinations and explains the processes of evidence recovery and preservation from a range of digital devices, including mobile phones, and other media. This book has a range of case studies and simulations will allow you to apply the knowledge of the theory gained to real-life situations.
By the end of this book you will have gained a sound insight into digital forensics and its key components.
What You Will Learn
- Gain familiarity with a range of different digital devices and operating and application systems that store digital evidence.
- Appreciate and understand the function and capability of forensic processes and tools to locate and recover digital evidence.
- Develop an understanding of the critical importance of recovering digital evidence in pristine condition and ensuring its safe handling from seizure to tendering it in evidence in court.
- Recognise the attributes of digital evidence and where it may be hidden and is often located on a range of digital devices.
- Understand the importance and challenge of digital evidence analysis and how it can assist investigations and court cases.
- Explore emerging technologies and processes that empower forensic practitioners and other stakeholders to harness digital evidence more effectively.
About the Author
Richard Boddington commenced general policing with the London Metropolitan Police in 1968 and joined the Royal Hong Kong Police in 1971, later serving as a chief inspector in the Special Branch. In 1980, Richard moved to Australia and worked as a desk officer and case officer with the Australian Security Intelligence Organization. He later worked in several federal and state government agencies, including the Western Australia Department of Treasury and Finance, as a senior intelligence officer.
In 2008, he commenced developing and coordinating information security and digital forensics undergraduate and postgraduate courses at Murdoch University, where he was responsible for the creation of a digital forensic and information security degree offering. He provided a unique online virtual digital forensics unit for postgraduate students at the University of Western Australia in 2014.
Between 1991 and 2015, Richard was a security analyst and digital forensic practitioner, providing independent consultancy services for legal practitioners and organizations requiring independent digital forensic examinations and reports. This included analyzing case evidence in criminal and civil cases heard at Magistrate, District and Commonwealth Courts. His work included the compilation of digital forensic reports and testifying as an expert witness on complex technical matters to assist the jury in understanding digital evidence presented during trial.
Recent forensic examinations undertaken by him include analyzing digital evidence recovered from computers, mobile phones, and other digital devices and then preparing expert testimony relating to a broad range of criminal and civil cases, including:
- Child pornography and child exploitation
- Aggravated burglary and false imprisonment
- Analysis of CCTV video digital evidence of assault and rape cases
- Alleged homicide, suicide, and other crimes of violence
- Bomb threats
- Family law disputes and Australian Vietnamese Relief Organization (AVRO) breaches
- Workers’ compensation disputes
- Suspected forgery or manipulation of digital video and mobile phone evidence
- Industrial espionage and sabotage and intellectual property theft
Since 2015, Richard has continued his digital forensics examinations on behalf of TSW Analytical Pty Ltd in Western Australia, where he now heads the Digital Forensics and Data Recovery Team.
He is also the General Manager for Research and Training at eReveal Technologies Pty Ltd (TSW Global Company) and is responsible for designing and coordinating online digital forensics, multimedia forensics, and e-discovery training courses for a broad range of organizations.
Richard is presently developing online digital forensics and e-discovery academic postgraduate course for the evolving Institute for Applied Forensic Science, associated with TSW Analytical, as part of broader postgraduate forensic course offerings in Australasia and overseas.
In 2010, Richard authored two digital forensics chapters in Digital Business Security Development: Management Technologies. He has also written a number of journal articles on the validation of digital evidence, his ongoing research area.
In 2015, he authored an online video cast series, Emerging Forensic Tools for Locating and Analyzing Digital Evidence, on behalf of IGI Global Video Lecture E-Access Videos.
$9.99 Dynamic SQL Applications, Performance, and Security
$9.99 Apress eBook by Edward Pollack. This book covers Dynamic SQL, Microsoft SQL Server, SQL Injection Attacks, Security.
- Build flexible applications that respond fast to changing business needs
- Take advantage of unconventional but productive uses of dynamic SQL
- Protect your data from attack through best-practices in your implementations
This book is an introduction and deep-dive into the many uses of dynamic SQL in Microsoft SQL Server. Dynamic SQL is key to large-scale searching based upon user-entered criteria. It’s also useful in generating value-lists, in dynamic pivoting of data for business intelligence reporting, and for customizing database objects and querying their structure.
Executing dynamic SQL is at the heart of applications such as business intelligence dashboards that need to be fluid and respond instantly to changing user needs as those users explore their data and view the results. Yet dynamic SQL is feared by many due to concerns over SQL injection attacks. Reading Dynamic SQL: Applications, Performance, and Security is your opportunity to learn and master an often misunderstood feature, including security and SQL injection.
All aspects of security relevant to dynamic SQL are discussed in this book. You will learn many ways to save time and develop code more efficiently, and you will practice directly with security scenarios that threaten companies around the world every day. Dynamic SQL: Applications, Performance, and Security helps you bring the productivity and user-satisfaction of flexible and responsive applications to your organization safely and securely. Your organization’s increased ability to respond to rapidly changing business scenarios will build competitive advantage in an increasingly crowded and competitive global marketplace.
- Discusses many applications of dynamic SQL, both simple and complex.
- Explains each example with demos that can be run at home and on your laptop.
- Helps you to identify when dynamic SQL can offer superior performance.
- Pays attention to security and best practices to ensure safety of your data.
What You Will Learn
- Build flexible applications that respond fast to changing business needs.
- Take advantage of unconventional but productive uses of dynamic SQL.
- Protect your data from attack through best-practices in your implementations.
- Know about SQL Injection and be confident in your defenses against it
- Run at high performance by optimizing dynamic SQL in your applications.
- Troubleshoot and debug dynamic SQL to ensure correct results.
Who This Book is For
Dynamic SQL: Applications, Performance, and Security is for developers and database administrators looking to hone and build their T-SQL coding skills. The book is ideal for advanced users wanting to plumb the depths of application flexibility and troubleshoot performance issues involving dynamic SQL. The book is also ideal for beginners wanting to learn what dynamic SQL is about and how it can help them deliver competitive advantage to their organizations.
About the Author
Edward Pollack is a database administrator with over 15 years of professional experience in database design, optimization, server hardware, and public speaking. He has spoken at dozens of SQL Saturday events, as well as at 24 Hours of PASS and the PASS Summit. His passion for sharing knowledge also leads him to create and coordinate a SQL Saturday in New York’s Capital Region, where he has lived for the past 19 years. His long experience computing has lead Edward through many different fields of study, but data storage, security, and optimization has been the one area that has always been of most interest; it will continue to be so for as long as people continue to care about their data.
50% off Docker in Motion
50% off Manning’s Video by Peter Fisher. This video covers Docker.
Docker in Motion teaches you how to create and manage container-hosted applications in Docker. With over 2 hours of hands-on, practical video lessons, you’ll learn the ins and outs of Docker and discover how to apply what you’ve learned to your own day-to-day development. Starting with an overview of Docker, you’ll dive into the commands and techniques you’ll need for running and managing containers, creating, modifying, saving and uploading Docker images from scratch, running and building multiple containers with Docker Compose, and more.
About the subject
Docker creates sandboxed environments, called containers, that isolate your applications from the underlying infrastructure, making them much easier to deploy, migrate, scale, and remove. Each Docker container includes the application and all its dependencies in a single deployable package. Docker has rapidly become a nearly universal part of IT infrastructure in millions of Linux and cloud-based deployments worldwide, including big shops like eBay and Lyft. It’s time to join them!
No experience with Docker is required. The course assumes basic familiarity with Linux and software development.
What you will learn
- An introduction to Docker and how it works
- Image management
- Creating Docker images
- Managing containers
- Storing and managing data in volumes
- Linking your Docker containers
- Running a web server which is connected to a database
- Configuring containers using docker-compose
About the instructor
Peter Fisher a freelance web and mobile app developer. He’s the host of the HowToCodeWell YouTube channel, where he posts weekly tutorials and talks on web development and other subjects.
50% off Manning’s eBook by Ian Miell, Aidan Hobson Sayers. This book covers Docker.
Docker in Practice, Second Edition presents nearly 120 practical techniques, hand-picked to help you get the most out of Docker. Following a Problem/Solution/Discussion format, you’ll walk through specific examples that you can use immediately, and you’ll get expert guidance on general techniques you can apply to a whole range of scenarios. You’ll tackle server maintenance, Swarm Mode, deployment, experimenting with your containers, and much more. Fully updated with newly-discovered techniques and interesting use cases, Docker in Practice, Second Edition is an essential resource that you’ll want to have open on your desk!
About the technology
Docker’s simple idea, wrapping an application and its dependencies into a single deployable package, has continued to drive a revolution in software delivery. Docker is now the foundation of CI and CD pipelines, microservice systems, infrastructure automation, and countless innovative twists on the dev process. As well, Docker boasts an incredibly diverse and rich ecosystem, including Kubernetes, CoreOS, Mesos, OpenShift, and the 100,000+ images available on Docker Hub. The options are limitless; Docker in Practice is your guide to the ideas, techniques, and tools that give you the most return on your time.
- New techniques and the latest best practices
- Continuous integration and delivery
- Swarm Mode services and routing mesh
- The Kubernetes orchestration tool
- Streamlining your cloud workflow
- Navigating the Docker ecosystem
About the reader
Written for developers and engineers using Docker in production.
About the authors
Ian Miell is the Lead OpenShift Architect at Barclays.
Aidan Hobson Sayers is a developer at Hadean. Previously, they used Docker to transform DevOps at OpenBet.
GET MORE WITH MANNING
An eBook copy of the previous edition, Docker in Practice (First Edition), is included at no additional cost. It will be automatically added to your Manning Bookshelf within 24 hours of purchase.
50% off Docker in Action
50% off Manning’s eBook by Jeff Nickoloff with foreword by Ahmet Alp Balkan. This book covers Docker, Docker Compose, Docker Machine, Docker Swarm.
Docker in Action teaches readers how to create, deploy, and manage applications hosted in Docker containers. After starting with a clear explanation of the Docker model, you will learn how to package applications in containers, including techniques for testing and distributing applications. You will also learn how to run programs securely and how to manage shared resources. Using carefully designed examples, the book teaches you how to orchestrate containers and applications from installation to removal. Along the way, you’ll discover techniques for using Docker on systems ranging from dev-and-test machines to full-scale cloud deployments.
About the technology
The idea behind Docker is simple. Create a tiny virtual environment, called a container, that holds just your application and its dependencies. The Docker engine uses the host operating system to build and account for these containers. They are easy to install, manage, and remove. Applications running inside containers share resources, making their footprints small.
- Packaging containers for deployment
- Installing, managing, and removing containers
- Working with Docker images
- Distributing with DockerHub
About the reader
Readers need only have a working knowledge of the Linux OS. No prior knowledge of Docker is assumed.
About the author
A software engineer, Jeff Nickoloff has presented Docker and its applications to hundreds of developers and administrators at Desert Code Camp, Amazon.com, and technology meetups.
- QLab 4 Show Control, 2nd Edition (Book) by Jeromy Hopgood
- International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) Volume 9, Issue 3 (Book) by Tao Gao
- International Journal of Computer-Assisted Language Learning and Teaching (IJCALLT) Volume 7, Issue 3 (Book) by Bin Zou, Michael Thomas
- International Journal of Cyber Behavior, Psychology and Learning (IJCBPL) Volume 7, Issue 3 (Book) by Robert Atkinson, Zheng Yan
- International Journal of Decision Support System Technology (IJDSST) Volume 10, Issue 1 (Book) by Pascale Zaraté
- International Journal of Electronic Government Research (IJEGR) Volume 13, Issue 3 (Book) by Vishanth Weerakkody
- International Journal of Information Security and Privacy (IJISP) Volume 12, Issue 1 (Book) by Li Yang, Dalei Wu
- International Journal of Knowledge Discovery in Bioinformatics (IJKDB) Volume 7, Issue 2 (Book) by George Perry, Clyde Phelix
- International Journal of Mobile and Blended Learning (IJMBL) Volume 10, Issue 1 (Book) by David Parsons
- International Journal of Online Pedagogy and Course Design (IJOPCD) Volume 8, Issue 1 (Book) by Chia-Wen Tsai, Pei-Di Shen
- International Journal of Technology and Human Interaction (IJTHI) Volume 14, Issue 1 (Book) by Anabela Mesquita, Chia-Wen Tsai
Maker Media, Inc
- Making Things Talk, 3rd Edition (Book) by Tom Igoe
O’Reilly Media, Inc.
- Applying and Measuring Your CSS Against Your Style Guide (Book) by Archana Sankaranarayanan
- Designing Distributed Systems (Book) by Brendan Burns
- Presto Sketching (Book) by Ben Crothers
- Ansible 2: Advancements with Security Automation (Video) by Anish Nath
- Azure Functions - Essentials (Video) by Praveen Kumar Sreeram
- Fundamentals of Statistical Modeling and Machine Learning Techniques (Video) by Pratap Dangeti
- Working with Data and Cloud in Spring 5.0 (Video) by Ranga Rao Karanam
- Java How to Program, Early Objects, 11th Edition (Book) by Paul J. Deitel, Harvey Deitel
Stone River eLearning
- Docker for DevOps: From Development to Production (Video) by Stone River eLearning
- Ehtical Hacking: Recon and Footprinting (Video) by Chad Russell
- Ehtical Hacking: Social Engineering (Video) by Chad Russell
- Ehtical Hacking: Wireless Hacking (Video) by Stone River eLearning
- Ethical Hacking: Hacking Applications (Video) by Chad Russell
- Ethical Hacking: Hacking Databases (Video) by Chad Russell
- Ethical Hacking: Honeypots, IDS and Firewalls (Video) by Chad Russel
- Ethical Hacking: Malware Development (Video) by Chad Russel
- Micro-experimentation Tools in Java 9 (Video) by Josh Cummings