Computer and intrusion forensics
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studi...
Saved in:
| Other Authors: | Mohay, George M. 1945- |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boston
Artech house
c2003
|
| Series: | Artech House computer security series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
Forensic computing
by: Sammes, A.J, et al.
Published: (2007)
by: Sammes, A.J, et al.
Published: (2007)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Integrating forensic computing into incident management for a desktop support project
by: Suhaila Ismail
Published: (2009)
by: Suhaila Ismail
Published: (2009)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Security, privacy, and forensics issues in big data
Published: (2020)
Published: (2020)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
Forensic discovery
by: Farmer
Published: (2005)
by: Farmer
Published: (2005)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Practical digital forensics get started with the art and science of digital forensics with this practical, hands-on guide!
by: Boddington, Richard
Published: (2016)
by: Boddington, Richard
Published: (2016)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Oracle incident response and forensics preparing for and responding to data breaches
by: Finnigan, Pete
Published: (2018)
by: Finnigan, Pete
Published: (2018)
A Practical Guide to Digital Forensics Investigations /
by: Hayes, Darren Richard
Published: (2021)
by: Hayes, Darren Richard
Published: (2021)
EnCase computer forensics the official EnCE : EnCase certified examiner study guide
by: Bunting, Steve
Published: (2012)
by: Bunting, Steve
Published: (2012)
File system forensic analysis
by: Carrier
Published: (2005)
by: Carrier
Published: (2005)
Information protection playbook
Published: (2013)
Published: (2013)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Digital forensics
Published: (2018)
Published: (2018)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Forensic chemistry fundamentals and applications
Published: (2016)
Published: (2016)
Novel solid-phase microextraction fiber coating for the forensic detection of accelerants in arson samples
by: Umi Kalthom Ahmad
Published: (2008)
by: Umi Kalthom Ahmad
Published: (2008)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
Improving information security practices through computational intelligence
Published: (2016)
Published: (2016)
Forensic biology
by: Li, Richard
Published: (2015)
by: Li, Richard
Published: (2015)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification
Published: (2009)
Published: (2009)
The science of forensic entomology
by: Rivers, David B., et al.
Published: (2014)
by: Rivers, David B., et al.
Published: (2014)
X-Ways forensics practitioner's guide
by: Shavers, Brett
Published: (2014)
by: Shavers, Brett
Published: (2014)
Forensic psychology the basics
by: Taylor, Sandra
Published: (2015)
by: Taylor, Sandra
Published: (2015)
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
Similar Items
-
Guide to computer forensics and investigations
Published: (2004) -
Security in computing
by: Pfleegar, Charles P.
Published: (1997) -
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005) -
Forensic computing
by: Sammes, A.J, et al.
Published: (2007) -
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)


