Computer crime evidence-preservation checklist | You've detected a computer crime and decided to report that activity to law enforcement. But before you touch the affected machine, open a single event log, or run another program, you must secure all digital evidence. This checklist tells you what to do and what not to do in the aftermath of a computer crime. Download it now >> |  |
| More from TR Pro | | Manage the Enterprise Attack Surface Organizations often see security as collections of identified vulnerabilities in silos. This isolation perspective misses the proverbial big picture--the "attack surface". Download it now >> | IT Manager's Toolkit for "Staying Legal" As an IT manager, you need to be familiar with what constitutes discrimination and how to avoid discriminatory behavior. Download it now >> | Incident management: Managing the inevitable Security incidents of all types regularly occur in every organization. This in-depth report explains how to take a formal approach to incident management so that you can reduce business impact and implement effective controls, document your response processes, and train prevention and response teams. Download it now >> | | Not a Member? Check out this free TR Pro sample download: | Learn your way around Outlook fast You may know the basics of how to Microsft Outlook, but not how to use Outlook effectively. How do you get up to speed quickly without wasting time? If you had a TechRepublic Pro subscription, you could solve the problem quickly with exclusive downloads such as TechRepublic Pro's Quick Reference: Microsoft Outlook. | Discover other tools and downloads like this by becoming a TR Pro member today! | | |  |  | Connect with TechRepublic | | | | |
No comments:
Post a Comment