|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Nihad A. Hassan , Rami HijaziPublisher: APress Imprint: APress Edition: 1st ed. Weight: 0.721kg ISBN: 9781484232125ISBN 10: 1484232127 Pages: 354 Publication Date: 01 July 2018 Audience: College/higher education , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsAuthor InformationNihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research in different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed many technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber Open Source Intelligence (OSINT). Nihad has authored four books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog (DarknessGate) and recently launched a dedicated site for Open Source Intelligence resources. Nihad has a BSc honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter at @DarknessGate, and you can connect to him via LinkedIn (DarknessGate). Rami Hijazi holds a master's degree in information technology (information security) from the University of Liverpool. He works for Mericler, Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, e-commerce, agile development, database design, and data handling analysis. He also works as an information security consultant, where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, and planning and development advice for IT departments concerned with contingency planning. Tab Content 6Author Website:Countries AvailableAll regions |