Retail Price Sheet

Is Your Transaction Secure?

Digital Forensic Evidence Examination

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Digital Forensic Evidence Examination focuses on the scientific basis for analysis, interpretation, attribution, and reconstruction of digital forensic evidence in a legal context.

It defines the bounds of "Information Physics" as it affects digital forensics and introduces a new model of the overall processes associated with the use of such evidence in legal matters. It then reviews and discusses analysis, interpretation, attribution, and reconstruction issues, discusses tools and methodologies and their limits, and adds a short perspective for the future. Detailed Table of Contents - Detailed Index

Enterprise Information Protection

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Enterprise Information Protection is about effective protection for large enterprises and how it can be attained and maintained over time. Coverage starts with an overview of the underlying reasons for protection and how it attained. Business modeling for the enterprise is discussed and used to lead to decisions about the duty to protect and risk management. From Risk management, governance is applied to provide protection through organization and business functions. Control architecture is applied to model the protective functions and match surety to risk, and as a guide to technical implementation. Finally, issues of decision-making and decision support at the enterprise level are explored in light of the protection program. This book was designed to be suitable as a graduate text as well as a guide for decision-makers within enterprises, and consolidates results from other related works into a single reference book that covers the issues in a more comprehensive and authoritative manner than other works of its sort. Detailed Table of Contents - Detailed Index

Challenges to Digital Forensic Evidence

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Challenges to Digital Forensic Evidence starts with the underlying structure and theory of challenges and moves into proactical examples and advice, case studies, and details of how many of the most common types of evidence have gone wrong in case after case. IT is designed to be suitable for use as a graduate textbook or workbook but it is also helpful for the practitioner, expert witness, or lawyer involved in cases where digital forensic evidence is used. Detailed table of contents

Information Security Awareness Basics

US Mail @10 @100 Details
Call for pricing Call for pricing Call for pricing

Information Security Awareness Basics This booklet provides a basic awareness program for a worker at an enterprise. It is designed to be used as a template for creating a customized awareness booklet for larger scale production and deployment, however, in small quantity it is suitable for awareness within an organization. For larger volume purchasing and customized versions, see http://all.net/ under their Awareness heading. Detailed table of contents.

Governance Guidebook

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Governance Guidebook The governance guidebook provides comprehensive coverage of the information protection governance issues faced by enterprises. It provides management level descriptions of all of the information protection issues and functions including information on how to manage programs, using influence to achieve security objectives, and many helpful process and structure diagrams to ease the control burden. Detailed table of contents

Security Decisions 2006

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Security Decisions The governance guidebook provides comprehensive coverage of the information protection governance issues faced by enterprises. It provides management level descriptions of all of the information protection issues and functions including information on how to manage programs, using influence to achieve security objectives, and many helpful process and structure diagrams to ease the control burden. Drill-down

Security Metrics

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Security Metrics This book provides comprehensive metrics that cover the issues addressed in the Governance Guidebook and acts as a companion that allows the governance issues to be measured bot internally and against other organizations, due diligence criteria, and standards. Drill-down

Security Checklists: Governance

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Security Checklists: Governance This book provides checklists for governance aspects of information protection programs in generic form. Drill-down

Security Checklists: Technical

Color B&W Details
Order from Amazon.Com Order from Amazon.Com

Security Checklists: Technical This book provides checklists for technical aspects of information protection programs in generic form.

Books

US Mail US FedEx Non US Details
Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

World War 3: We are losing it and most of us didn't even know we were fighting in it - Information Warfare Basics is a book that overviews a very wide spectrum of information warfare issues, presenting each one as a series of short subjects and covering the entire spectrum of conflict from many different perspectives. It is both entertaining and eye-opening and is a must read for the warfare, intelligence, or cyber security buff. Drill-down

Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Frauds, Spies, and Lies: and how to Defeat them a humorous and very timely approach to a serious subject. It includes humorous cartoons that give examples of fraud attempts and how to defeat them, many stories that have never before been told, and provides insight into people, their weaknesses, and how to overcome them. Drill-down

Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Computer Viruses: The original Ph.D. Thesis on Computer Viruses. Widely considered the seminal technical work on computer viruses and the limits of virus defense. International cost includes added shipping and handling.

Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Fred's Papers: A collection of more than 20 of the original journal articles on Computer Viruses and Related Information Security Subjects. International cost includes added shipping and handling.

Order from Amazon.Com Order from Amazon.Com Order from Amazon.Com

Short Course on Computer Viruses: This is widely considered one of the best books ever written on computer viruses and virus defenses. It predates the Wiley book (2nd edition) of the same name. International cost includes added shipping and handling.

Courses on CD

US Mail US FedEx Non US Details
Call for pricing Call for pricing Call for pricing

Intro to Linux: This White-Glove-based short course provides everything you need to learn about Using Linux. From basics of starting up Linux from a CD to using the X11 user interface to getting on the Internet and running applications, to files and groups and processes, this course covers the basics you need to know to use and operate Linux-based systems. It comes on a bootable CD that allows you to do everything in the short course as you learn it.

Call for pricing Call for pricing Call for pricing

Linux Networking: This White-Glove-based short course provides everything you need to learn to create and operate Linux-based networks. Everything from how IPv4 datagrams are formatted and used to interfaces, routing, and gateways. It goes through examples with protocol analyzers, scanners, and network servers and details how they work. It even covers creation of large-scale networks using network transfer points. It comes on a bootable CD that allows you to do everything in the short course as you learn it.

Call for pricing Call for pricing Call for pricing

Combined Course: This CD combines the Introduction to Linux and Linux Networking CDs into a single CD. It saves you money and allows us to provide even more value.

Call for pricing Call for pricing Call for pricing

Deception and Information Protection: This course covers recent results in the use of deception in information protection and includes results of recent experiments showing precisely how effective deception is as a defense.

Call for pricing Call for pricing Call for pricing

The Comprehensive Short Course on Cyber Threats, Attacks, and Defenses: This course provides a comprehensive overview of the information protection field by describing the almost 100 methods of attack, the scores of threats that use them, and more than 140 defenses against them.

Call for pricing Call for pricing Call for pricing

Firewalls, the Internet, and Secure Enterprise Networking: This course provides one of the most comprehensive overviews of firewalls and secure enterprise networking in existence. It includes details on firewall limitations, costs, implementation, and applications as well as firewall architecture, management, testing, and a wide range of other related information to help you understand and secure your networked computing resources.

Call for pricing Call for pricing Call for pricing

A Short Course on Computer Viruses: This short course has been taught to thousands of students from around the world at a cost in excess of $400 per student.

Call for pricing Call for pricing Call for pricing

Digital Forensics: This course provides a comprehensive overview of digital forensics with a slight focus on the Unix operating environment and examples from many other sorts of systems.

Software

Call for pricing

CashFlowPro Management Analytics Cash Flow Analysis system on a bootable White Glove CD. Built to analyze cash flows for arbitrary businesses and display them in a Web browser. For more details see the CashFlow home page.

Call for pricing

ForWord Forensics for Word. This forensic analysis tool is a customized version of the LAOLA perl scripts that provide forensic analysis of Word documents. It is delivered via email and includes complete instructions.

Call for pricing

FormBox FormBox is a perl script that implements a whole series of calculators and other form-based entry forms from a shell script using perl. It is delivered via email and includes complete instructions.

Call for pricing

CheckBook CheckBook is a perl script that implements a checkbook with lots of data entry features, sorting, multiple accounts, and running balances. It is simple and easy to use, implemented in perl so it is easily customized, and stores its database in CSV files for easy import and export with other databases and spreadsheets. It is delivered via email and includes complete instructions.

University and Student Discounts

Professors wanting to set up classes click here
Students wanting more information click here

Student and Teacher Specials

Item Details
Call for pricing

The Chief Information Security Officer Toolkit - Governance Guidebook See detailed description below. ONLY available at this price to university students and their professors FAX a copy of your student ID to get the order filled. Detailed table of contents

Title US Mail US FedEx Non-US Special restrictions / Includes
Fred's Papers Call for pricing Call for pricing Call for pricing FAX current valid student ID to 925-454-0171
Book only
Computer Viruses Call for pricing Call for pricing Call for pricing FAX current valid student ID to 925-454-0171
Book only
3-book set Call for pricing Call for pricing Call for pricing FAX current valid student ID to 925-454-0171
Books only
Linux Introduction Call for pricing Call for pricing Call for pricing FAX current valid student ID to 925-454-0171
Bootable CD with on-CD course
Linux Networking Call for pricing Call for pricing Call for pricing FAX current valid student ID to 925-454-0171
Bootable CD with on-CD course
Linux Combined Call for pricing Call for pricing Call for pricing FAX current valid student ID to 925-454-0171
Bootable CD with on-CD courses
Deception Class Call for pricing Call for pricing Call for pricing ONLY professor designated students will receive materials
Class books
Threat/Attack/Defense Call for pricing Call for pricing Call for pricing ONLY professor designated students will receive materials
Bootable Linux Simulator CD + Class lectures and slides CD
Firewalls Course Call for pricing Call for pricing Call for pricing ONLY professor designated students will receive materials
Bootable Linux Combined Course CD + Class lectures and slides CD
Viruses Class Call for pricing Call for pricing Call for pricing ONLY professor designated students will receive materials
Bootable Linux Combined Course CD + Class lectures and slides CD
Forensics Class Call for pricing Call for pricing Call for pricing ONLY professor designated students will receive materials
Bootable Linux Forensics CD + Class lectures and slides CD
Cashflow Analyzer Call for pricing Call for pricing Call for pricing FAX Student ID to 925-454-0171 with a copy of your order
Bootable Linux Forensics CD with CashFlow Analyzer

Terms and Conditions: All orders are FOB our shipping point, payment due before shipment. 60 day limited warranty for parts and labor. Prices exclusive of tax and customs fees. All orders are final. Typical delivery 15 days from order, however, due to supply and delivery limitations and seasonal variations, 45 day maximum delivery times are sometimes in effect. Payment by check, money order, or credit card. No COD. Technical support via email and web. Prices, delivery, components, and capacities subject to change without notice. We reserve the right, at our sole discretion, to upgrade any purchase to a more expensive CD that has at least all of the features ordered, at no additional cost to the purchaser.

Purchase orders: We do accept purchase orders, however, there is an additional fee of $50 for processing purchase orders, regardless of their size. All purchases via purchase order (other than US Government Purchases for large dollar amounts that are handled separately) must result in pre-payment before we will process the order. You send the PO, we send an invoice, you send a check, we send the goods. Pre-payment of the purchase order fee via credit card is strongly encouraged.

Policy: Any circumvention of purchasing procedures - for example by changing prices on items or using forged entries to the credit card provider - will be treated as if the charged amount are consulting fees for our efforts in clearing up the issue. We appreciate your donation.