Credits

Figure Number

Attribution/Credit Line

Figure 2-1

Screenshot of Command prompt © Microsoft 2019

Figure 2-2

Screenshot of Command prompt © Microsoft 2019

Figure 2-3

Screenshot of Command prompt © Microsoft 2019

Figure 2-4

Screenshot of Command prompt © Microsoft 2019

Figure 2-5

Screenshot of Command prompt © Microsoft 2019

Figure 2-6

Screenshot of Command prompt © Microsoft 2019

Figure 2-7

Screenshot of Command prompt © Microsoft 2019

Figure 2-8

Screenshot of Command prompt © Microsoft 2019

Figure 2-9

Screenshot of Command prompt © Microsoft 2019

Figure 3-1

Screenshot of windows © Microsoft 2019

Figure 3-2

Screenshot of windows © Microsoft 2019

Figure 3-3

Screenshot of windows © Microsoft 2019

Figure 3-4

Screenshot of windows © Microsoft 2019

Figure 3-5

Screenshot of windows © Microsoft 2019

Figure 4-1

Screenshot of Command prompt © Microsoft 2019

Figure 4-2

Screenshot of LOIC © Praetox Technologies

Figure 4-3

Screenshot of XOIC © Praetox Technologies

Figure 5-1

Screenshot of Command prompt © Microsoft 2019

Figure 5-2

Screenshot of Counterexploitation © CEXX.ORG

Figure 5-3

Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.

Figure 5-4

Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.

Figure 5-5

Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.

Figure 5-6

Screenshot of Norton Security © 1995 - 2019 Symantec Corporation

Figure 5-7

Screenshot of McAfee AntiVirus © 2019 McAfee, LLC

Figure 5-8

Screenshot of Avast © 1988-2019 Copyright Avast Software s.r.o

Figure 5-9

Screenshot of AVG © 1988-2019 Copyright Avast Software s.r.o

Figure 5-10

Screenshot of Malwarebytes © 2019 Malwarebytes

Figure 5-11

Screenshot of Windows © Microsoft 2019

Figure 6-1

Screenshot of Netcraft © 1995-2019 Netcraft Ltd

Figure 6-2

Screenshot of WayBackMachine BETA © Internet Archive

Figure 6-3

Screenshot of Zenmap © NMAP.ORG

Figure 6-4

Screenshot of Cain © Cain and Abel

Figure 6-5

Screenshot of Shodan © 2013-2019 Shodan

Figure 6-6

Screenshot of Shodan © 2013-2019 Shodan

Figure 6-8

Screenshot of OphCrack © 2019 Slashdot Media

Figure 6-9

Screenshot of TeraBIT Virus Maker © TeraBIT Virus Maker

Figure 6-11

Screenshot of Yahoo © 2019 Verizon Media

Figure 6-12

Screenshot of Peoples Drug Store © 2019 Digital Pharmacist Inc.

Figure 7-2

New Africa/Shutterstock

Figure 7-4

Reed Kaestner/Getty Images

Figure 7-5

Screenshot of VeraCrypt © IDRIX

Figure 7-6

Screenshot of windows © Microsoft 2019

Figure 8-2

Chuck Easttom

Figure 9-1

Screenshot of Windows 10 Firewall © Microsoft 2019

Figure 9-2

Screenshot of Snort Installation © 2019 Cisco

Figure 9-7

Screenshot of Windows-style library © Microsoft 2019

Figure 11-1

Screenshot of Shutting Down a Service in Windows © Microsoft 2019

Figure 11-2

Screenshot of Disabled services © Microsoft 2019

Figure 11-4

Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019

Figure 11-5

Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019

Figure 11-6

Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019

Figure 11-7

Screenshot of Nessus © 2019 Tenable

Figure 11-8

Screenshot of Nessus © 2019 Tenable

Figure 11-9

Screenshot of Nessus © 2019 Tenable

Figure 11-10

Screenshot of Nessus © 2019 Tenable

Figure 11-11

Screenshot of Nessus © 2019 Tenable

Figure 11-12

Screenshot of OWASP ZAP © OWASP

Figure 11-13

Screenshot of OWASP ZAP © OWASP

Figure 11-14

Screenshot of shodan © 2013-2019 Shodan®

Figure 11-15

Screenshot of shodan © 2013-2019 Shodan®

Figure 12-1

Dan Grytsku/123RF

Figure 12-2

Screenshot of Sinn Fein © Sinn Féin

Figure 12-3

Screenshot of BBC News © 2019 BBC

Figure 12-4

Screenshot of Cyberterrorism Preparedness Act

Figure 12-5

Screenshot of Cyberterrorism Preparedness Act

Figure 12-6

Screenshot of Tech Law Journal

Figure 12-7

Screenshot of The Peoples drug store

Figure 12-8

Screenshot of ccPal Store

Figure 13-1

Screenshot of Yahoo © 2019 Verizon Media

Figure 13-2

Screenshot of Yahoo © 2019 Verizon Media

Figure 13-3

Screenshot of Yahoo © 2019 Verizon Media

Figure 13-4

Screenshot of Infobel © 1995 - 2019 Kapitol

Figure 13-6

Screenshot of Federal Bureau of Investigation

Figure 13-7

Screenshot of Texas Department of Public Safety © 2000- 2019 Texas Department of Public Safety.

Figure 13-8

Screenshot of Oklahoma

Figure 13-9

Screenshot of Google access ©2019 Google

Figure 14-1

Screenshot of FTK Imager © Copyright 2019 AccessData

Figure 14-2

Screenshot of FTK Imager © Copyright 2019 AccessData

Figure 14-3

Screenshot of FTK Imager © Copyright 2019 AccessData

Figure 14-4

Screenshot of FTK Imager © Copyright 2019 AccessData

Figure 14-5

Screenshot of FTK Imager © Copyright 2019 AccessData

Figure 14-6

Screenshot of OSForensics Copyright © 2019 PassMark® Software

Figure 14-7

Screenshot of OSForensics Copyright © 2019 PassMark® Software

Figure 14-8

Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC

Figure 14-9

Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC

Figure 14-10

pio3/Shutterstock

Figure 14-11

Screenshot of OSForensics Copyright © 2019 PassMark® Software

Figure 14-12

Screenshot of Command Prompt © Microsoft 2019

Figure 14-13

Screenshot of Command Prompt © Microsoft 2019

Figure 14-14

Screenshot of Command Prompt © Microsoft 2019

Figure 14-15

Screenshot of Command Prompt © Microsoft 2019

Figure 14-16

Screenshot of Windows registry © Microsoft 2019

Figure 14-17

Screenshot of Windows registry © Microsoft 2019

Figure 15-10

Screenshot of Microsoft Excel © Microsoft 2019

Cover

gintas77/Shutterstock

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.128.31.180