Forensic discovery
Saved in:
| Main Author: | Farmer |
|---|---|
| Other Authors: | Venema |
| Format: | Book |
| Published: |
Boston
Addison-Wesley
c2005
|
| Series: | Addison-Wesley professional computing series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Domain-specific application frameworks frameworks experience by industry
Published: (1999)
Published: (1999)
Utility of force the art of war in the modern world
by: Smith
Published: (2007)
by: Smith
Published: (2007)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
SQL server 7 backup & recovery
by: DesailhAnil
by: DesailhAnil
Disaster Recovery Planning strategies for protecting critical information
by: Toigo lhJon
by: Toigo lhJon
Windows forensics and incident recovery
by: Carvey, Harlan A.
Published: (2005)
by: Carvey, Harlan A.
Published: (2005)
Computer and intrusion forensics
Published: (2003)
Published: (2003)
File system forensic analysis
by: Carrier
Published: (2005)
by: Carrier
Published: (2005)
Fire in the computer room, what now? Disaster recovery for business survival
by: NeagalhGregor
by: NeagalhGregor
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Integrating forensic computing into incident management for a desktop support project
by: Suhaila Ismail
Published: (2009)
by: Suhaila Ismail
Published: (2009)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Computer forensics principles and practices/
by: Volonino, Linda
Published: (2007)
by: Volonino, Linda
Published: (2007)
iPhone and iOS forensics investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by: Hoog, Andrew, et al.
Published: (2011)
by: Hoog, Andrew, et al.
Published: (2011)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
A Practical Guide to Digital Forensics Investigations /
by: Hayes, Darren Richard
Published: (2021)
by: Hayes, Darren Richard
Published: (2021)
Digital forensics
Published: (2018)
Published: (2018)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Forensic biology
by: Li, Richard
Published: (2015)
by: Li, Richard
Published: (2015)
Security, privacy, and forensics issues in big data
Published: (2020)
Published: (2020)
Forensic computing
by: Sammes, A.J, et al.
Published: (2007)
by: Sammes, A.J, et al.
Published: (2007)
Practical digital forensics get started with the art and science of digital forensics with this practical, hands-on guide!
by: Boddington, Richard
Published: (2016)
by: Boddington, Richard
Published: (2016)
Digital forensics and incident response incident response tools and techniques for effective cyber threat response
by: Johansen, Gerard
Published: (2022)
by: Johansen, Gerard
Published: (2022)
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012)
by: Malin, Cameron H.
Published: (2012)
Forensic psychology the basics
by: Taylor, Sandra
Published: (2015)
by: Taylor, Sandra
Published: (2015)
SQL server 2000 backup & recovery
by: Desai
Published: (2001)
by: Desai
Published: (2001)
Waste energy utilization technology
by: Kiang, Yen-Hsiung
Published: (1981)
by: Kiang, Yen-Hsiung
Published: (1981)
Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats
by: Johansen, Gerard
Published: (2020)
by: Johansen, Gerard
Published: (2020)
Similar Items
-
Domain-specific application frameworks frameworks experience by industry
Published: (1999) -
Utility of force the art of war in the modern world
by: Smith
Published: (2007) -
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005) -
SQL server 7 backup & recovery
by: DesailhAnil -
Disaster Recovery Planning strategies for protecting critical information
by: Toigo lhJon


